CN107579999A - Authentication method, device and the network equipment of data source equipment - Google Patents
Authentication method, device and the network equipment of data source equipment Download PDFInfo
- Publication number
- CN107579999A CN107579999A CN201710977885.4A CN201710977885A CN107579999A CN 107579999 A CN107579999 A CN 107579999A CN 201710977885 A CN201710977885 A CN 201710977885A CN 107579999 A CN107579999 A CN 107579999A
- Authority
- CN
- China
- Prior art keywords
- mark
- source device
- packet
- clear data
- signature value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention provides a kind of authentication method, device and the network equipment of data source equipment;Wherein, this method is applied to the network equipment, pre-saves the key matched with the network equipment in the network equipment, method includes:Receive the packet from external network;Parse packet, obtain clear data in packet, signature value and send packet source device mark;Obtain the informative abstract of clear data;Signature value is decrypted according to the mark of source device;According to the informative abstract of decrypted result and clear data, identifying whether for certification source device is legal.Signature value is decrypted by the mark of source device by the present invention, and then the legitimacy of authenticating device, makes the authentication operation of data source equipment more convenient, and cost is relatively low.
Description
Technical field
The present invention relates to device authentication technical field, more particularly, to a kind of authentication method of data source equipment, device
And the network equipment.
Background technology
The existing network equipment certification based on cryptographic technique usually requires to rely on digital certificate, but under the digital certificate
Hair and the operating process of keeping are relatively complicated, and also need to rely on CA (Certificate Authority, in certificate granting
The heart) Verification System, the digital certificate of part business needs to continue to pay dues every year.Meanwhile the certification of the network equipment is also relied on CA systems
Root certificate and certificate revocation information, cause the development difficulty of the authentication mode of the network equipment larger.
Authentication mode operation for data source equipment in above-mentioned existing network is relatively complicated, and cost is higher asks
Topic, not yet proposes effective solution.
The content of the invention
In view of this, it is an object of the invention to provide a kind of authentication method, device and the network of data source equipment to set
It is standby, so that the authentication operation of data source equipment is more convenient, and reduce cost.
In a first aspect, the embodiments of the invention provide a kind of authentication method of data source equipment, this method is applied to net
Network equipment, the key matched with the network equipment is pre-saved in the network equipment, method includes:Receive the number from external network
According to bag;Parse packet, obtain clear data in packet, signature value and send packet source device mark;Obtain
Take the informative abstract of clear data;Signature value is decrypted according to the mark of source device;According to decrypted result and plaintext number
According to informative abstract, identifying whether for certification source device be legal.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of the first of first aspect, wherein, on
The step of stating the informative abstract for obtaining clear data, including:The information that acquisition clear data is calculated using SM3 hash algorithms is plucked
Will, informative abstract includes cryptographic Hash.
With reference in a first aspect, the embodiments of the invention provide the possible embodiment of second of first aspect, wherein, on
Stating key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment;According to the mark of source device
The step of signature value is decrypted for knowledge, including:Using the mark of source device as public key, signature value is entered using SM9 algorithms
Row decryption, obtains cryptographic Hash corresponding to signature value;The mark of source device includes the MAC Address of source device.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the third of first aspect
Possible embodiment, wherein, the above-mentioned informative abstract according to decrypted result and clear data, the mark of certification source device is
No legal step, including:It is whether consistent with the cryptographic Hash of clear data to compare cryptographic Hash corresponding to signature value;If it is, really
The source device for determining packet matches with mark, and mark is legal;If not, do not determine the source device of packet with mark not
Match somebody with somebody, mark is illegal.
With reference to second of possible embodiment of first aspect, the embodiments of the invention provide the 4th of first aspect kind
Possible embodiment, wherein, the generating process of above-mentioned packet is as follows:Source device obtains clear data;Source device is adopted
The cryptographic Hash for obtaining clear data is calculated with SM3 hash algorithms;Private key in the unsymmetrical key that source device passes through preservation, is adopted
Cryptographic Hash is signed with SM9 algorithms, obtains signature value;Clear data and signature value are packaged processing, generate data
Bag.
Second aspect, the embodiments of the invention provide a kind of authentication device of data source equipment, device is arranged at network
Equipment, the key matched with the network equipment is pre-saved in the network equipment, device includes:Receiving module, come from for receiving
The packet of external network;Parsing module, for parsing packet, obtain clear data, signature value and the transmission in packet
The mark of the source device of packet;Summary acquisition module, for obtaining the informative abstract of clear data;Deciphering module, it is used for
Signature value is decrypted according to the mark of source device;Authentication module, for the information according to decrypted result and clear data
Summary, identifying whether for certification source device are legal.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of the first of second aspect, wherein, on
Summary acquisition module is stated, is additionally operable to:The informative abstract for obtaining clear data is calculated using SM3 hash algorithms, informative abstract includes
Cryptographic Hash.
With reference to second aspect, the embodiments of the invention provide the possible embodiment of second of second aspect, wherein, on
Stating key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment;Deciphering module is additionally operable to:Will
The mark of source device is decrypted to signature value using SM9 algorithms as public key, obtains cryptographic Hash corresponding to signature value;Come
The mark of source device includes the MAC Address of source device.
With reference to second of possible embodiment of second aspect, the embodiments of the invention provide the third of second aspect
Possible embodiment, wherein, above-mentioned authentication module, including:Compare the Hash of cryptographic Hash and clear data corresponding to signature value
Whether value is consistent;If it is, determining that the source device of packet matches with mark, mark is legal;If not, determine packet
Source device mismatches with mark, and mark is illegal.
The third aspect, the embodiments of the invention provide a kind of network equipment, including processor and machinable medium,
Machinable medium is stored with the machine-executable instruction that can be executed by processor, and computing device machine is executable to be referred to
Make to realize the authentication method of above-mentioned data source equipment.
The embodiment of the present invention brings following beneficial effect:
Authentication method, device and the network equipment of a kind of data source equipment provided in an embodiment of the present invention, pass through parsing
Packet from external network, clear data, signature value and the source device for sending packet in packet can be obtained
Mark;The decrypted result that signature value is decrypted according to the mark of the informative abstract of clear data and source device, can be with
Identifying whether for certification source device is legal;In which, signature value is decrypted by the mark of source device, and then recognizes
The legitimacy of equipment is demonstrate,proved, makes the authentication operation of data source equipment more convenient, and cost is relatively low.
Other features and advantages of the present invention will illustrate in the following description, or, Partial Feature and advantage can be with
Deduce from specification or unambiguously determine, or the above-mentioned technology by implementing the present invention can be learnt.
To enable the above objects, features and advantages of the present invention to become apparent, better embodiment cited below particularly, and match somebody with somebody
Accompanying drawing appended by conjunction, is described in detail below.
Brief description of the drawings
, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical scheme of the prior art
The required accompanying drawing used is briefly described in embodiment or description of the prior art, it should be apparent that, in describing below
Accompanying drawing is some embodiments of the present invention, for those of ordinary skill in the art, before creative work is not paid
Put, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of the authentication method of data source equipment provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the authentication method of another data source equipment provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of the authentication device of data source equipment provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of the network equipment provided in an embodiment of the present invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with accompanying drawing to the present invention
Technical scheme be clearly and completely described, it is clear that described embodiment is part of the embodiment of the present invention, rather than
Whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, belongs to the scope of protection of the invention.
Authentication mode operation in view of data source equipment in existing network is relatively complicated, and cost is higher asks
Topic, a kind of authentication method, device and the network equipment of data source equipment provided in an embodiment of the present invention;The technology can be applied
In network equipments such as interchanger, trunking, gateway device, terminal devices, source device certification is carried out to the data received
During;The technology can use related software or hardware to realize, be described below by embodiment.
A kind of flow chart of the authentication method of data source equipment shown in Figure 1, this method are applied to the network equipment,
The key matched with the network equipment is pre-saved in the network equipment;When actually realizing, a key management can be established
System, the server of the key management system issue the key to match to each network equipment;
This method comprises the following steps:
Step S102, receive the packet from external network;
Step S104, packet is parsed, the source for obtaining the clear data in packet, signature value and transmission packet is set
Standby mark;
The packet can be encapsulated by other network equipments, and be sent to the network equipment;For example, when the network equipment is
During switch A, the switch A is connected with switch b;After switch b is packaged to data, packet is generated, and this is counted
Sent according to bag to switch A;Now, switch b can be described as above-mentioned source device, and source device friendship is carried in the packet
Change planes B mark, for example, the IP address of source device, MAC Address or other numbers etc. the source device can be existed with unique mark
The information of identity in network.Above-mentioned source device can also be the terminal devices such as server, user terminal.
Step S106, obtain the informative abstract of clear data;
Step S108, signature value is decrypted according to the mark of source device;
Step S110, according to the informative abstract of decrypted result and clear data, identifying whether for certification source device is legal.
Specifically, when decrypted result is consistent with the informative abstract of clear data, it is above-mentioned for can confirm that above-mentioned packet
Source device is sent, and packet is not changed;When the informative abstract of decrypted result and clear data is inconsistent, illustrate above-mentioned
Packet is not source device, i.e., the mark of above-mentioned source device is inaccurate, or packet is changed.
The authentication method of a kind of data source equipment provided in an embodiment of the present invention, by parsing the number from external network
According to bag, can obtain the clear data in packet, signature value and send packet source device mark;According to plaintext number
According to informative abstract and source device mark decrypted result that signature value is decrypted, the mark of source device can be authenticated
It is whether legal;In which, signature value is decrypted by the mark of source device, and then the legitimacy of authenticating device, make
The authentication operation of data source equipment is more convenient, and cost is relatively low.
The flow chart of the authentication method of another data source equipment shown in Figure 2, this method are shown in Fig. 1
Realized on the basis of the authentication method of data source equipment;This method is applied to the network equipment, has been pre-saved in the network equipment
The unsymmetrical key pair matched with the network equipment;Public key in unsymmetrical key includes the mark of the network equipment;From the foregoing,
The mark of the network equipment can be that IP address, MAC Address or other numbers etc. can be with the unique mark source devices in a network
The information of identity;In the present embodiment, by the network equipment be identified as the MAC Address of the network equipment exemplified by illustrate, i.e., it is above-mentioned
Public key in unsymmetrical key is the MAC Address of the network equipment.
When actually realizing, a key management system can be established, the server of the key management system is to each net
Network equipment issues the key to match;In the present embodiment, illustrated by taking SM9 key management systems as an example.In this method, by counting
According to source device and the network equipment interaction realize;The source device of the data can also be a kind of network equipment;That is, network
In each network equipment can as the source device of data, when receiving the packet of other network equipments transmission,
The source device of the packet can also be authenticated, certification is finished and certification is by rear, then clear data is packaged into number
According to bag, send to other network equipments.
This method comprises the following steps:
Step S202, source device obtain clear data;
When actually realizing, when the source device is the terminal device in network, the clear data can be that user is defeated
The data entered;When the source device is the equipment such as interchanger, gateway, the clear data can be source device to receiving
After packet is parsed, the data of acquisition.
Step S204, source device calculate the cryptographic Hash for obtaining clear data using SM3 hash algorithms;
The cryptographic Hash is referred to as HASH values;The cryptographic Hash is that the clear data calculates acquisition by SM3 hash algorithms
Regular length binary value;Cryptographic Hash corresponds with clear data, i.e. if the clear data changes, the Kazakhstan
Uncommon value can also change therewith.
Step S206, the private key in the unsymmetrical key that source device passes through preservation, cryptographic Hash is carried out using SM9 algorithms
Signature, obtains signature value;SM9 algorithms are one kind in national secret algorithm;
Clear data and signature value are packaged processing by step S208, source device, generate packet.
Step S210, the network equipment receive the packet from source device;
Step S212, network equipment parsing packet, obtain the clear data in packet, signature value and send packet
Source device mark;In the embodiment, the mark of the source device includes the MAC Address of source device;
Step S214, the network equipment calculate the informative abstract for obtaining clear data, the informative abstract using SM3 hash algorithms
Including cryptographic Hash.SM3 algorithms are another national secret algorithms.
Step S216, the network equipment are solved using the mark of source device as public key using SM9 algorithms to signature value
It is close, obtain cryptographic Hash corresponding to signature value;The mark of the source device includes the MAC Address of source device.
Step S218, whether the network equipment compares cryptographic Hash corresponding to signature value consistent with the cryptographic Hash of clear data;Such as
Fruit is to perform step S220;If not, perform step S222;
Step S220, determine that the source device of packet matches with mark, mark is legal;
Step S222, the source device and mark for determining packet mismatch, and mark is illegal.
Generally, digital signature is a kind of cryptographic technique that can be verified;The digital signature of file is to be based on file and signature
The information of person's private key, completed by Hash functions and private key signature function.Digital Signature Algorithm includes signature algorithm
With verification algorithm two parts;Wherein, signature algorithm includes:Data are become fixed big by signer by HASH (hash) functions
It is small, HASH values are generated, signature operation is just carried out to HASH values by private key, generates signature value;Verification algorithm includes:Verifier is led to
Cross HASH (hash) functions and data are become fixed size, generate HASH values;Then, verifier checks the HASH values and signature value
In HASH values it is whether consistent, to determine whether data were modified.
A kind of authentication method of data source equipment provided in an embodiment of the present invention, the source device of data are miscellaneous by SM3
The algorithm that gathers obtains the cryptographic Hash of clear data, and obtains signature value by private key and SM9 algorithms, and data are generated after encapsulation process
Bag;After the network equipment is to resolve packet, the cryptographic Hash of clear data is obtained by SM3 hash algorithms, and passes through source device
Mark and SM9 algorithms obtain cryptographic Hash corresponding to signature value;According to Hash corresponding to the cryptographic Hash of clear data and signature value
Value, can authenticate source device identify whether it is legal;In which, signature value is solved by the mark of source device
It is close, and then the legitimacy of authenticating device, make the authentication operation of data source equipment more convenient, and cost is relatively low.
Corresponding to above method embodiment, a kind of structure of the authentication device of data source equipment shown in Figure 3 is shown
It is intended to;The device is arranged at the network equipment, and the key matched with the network equipment is pre-saved in the network equipment, the device bag
Include such as lower part:
Receiving module 30, for receiving the packet from external network;
Parsing module 31, for parsing packet, obtain the clear data in packet, signature value and send packet
The mark of source device;
Summary acquisition module 32, for obtaining the informative abstract of clear data;
Deciphering module 33, signature value is decrypted for the mark according to source device;
Authentication module 34, for the informative abstract according to decrypted result and clear data, the mark of certification source device is
It is no legal.
The authentication device of a kind of data source equipment provided in an embodiment of the present invention, by parsing the number from external network
According to bag, can obtain the clear data in packet, signature value and send packet source device mark;According to plaintext number
According to informative abstract and source device mark decrypted result that signature value is decrypted, the mark of source device can be authenticated
It is whether legal;In which, signature value is decrypted by the mark of source device, and then the legitimacy of authenticating device, make
The authentication operation of data source equipment is more convenient, and cost is relatively low.
Further, above-mentioned summary acquisition module, is additionally operable to:The letter for obtaining clear data is calculated using SM3 hash algorithms
Breath summary, informative abstract include cryptographic Hash.
Further, above-mentioned key includes unsymmetrical key pair;Public key in unsymmetrical key includes the mark of the network equipment
Know;Deciphering module is additionally operable to:Using the mark of source device as public key, signature value is decrypted using SM9 algorithms, signed
The cryptographic Hash that name-value pair is answered;The mark of source device includes the MAC Address of source device.
Further, above-mentioned authentication module, including:Comparing cryptographic Hash corresponding to signature value and the cryptographic Hash of clear data is
It is no consistent;If it is, determining that the source device of packet matches with mark, mark is legal;If not, determine the source of packet
Equipment mismatches with mark, and mark is illegal.
A kind of structural representation of network equipment shown in Figure 4;The equipment includes memory 100 and processor 101;
Wherein, memory 100 is used to store one or more computer instruction, and one or more computer instruction is executed by processor,
To realize the authentication method of above-mentioned data source equipment, the authentication method of the data source equipment can include in above method
It is one or more.
Further, the network equipment shown in Fig. 4 also includes bus 102 and communication interface 103, processor 101, communication interface
103 and memory 100 connected by bus 102.
Wherein, memory 100 may include high-speed random access memory (RAM, Random Access Memory),
Non-labile memory (non-volatile memory), for example, at least a magnetic disk storage may also be included.By extremely
A few communication interface 103 (can be wired or wireless) is realized logical between the system network element and at least one other network element
Letter connection, can use internet, wide area network, LAN, Metropolitan Area Network (MAN) etc..Bus 102 can be isa bus, pci bus or
Eisa bus etc..The bus can be divided into address bus, data/address bus, controlling bus etc..For ease of representing, only used in Fig. 4
One four-headed arrow represents, it is not intended that an only bus or a type of bus.
Processor 101 is probably a kind of IC chip, has the disposal ability of signal.It is above-mentioned in implementation process
Each step of method can be completed by the integrated logic circuit of the hardware in processor 101 or the instruction of software form.On
The processor 101 stated can be general processor, including central processing unit (Central Processing Unit, referred to as
CPU), network processing unit (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital
Signal Processing, abbreviation DSP), application specific integrated circuit (Application Specific Integrated
Circuit, abbreviation ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or
Person other PLDs, discrete gate or transistor logic, discrete hardware components.It can realize or perform sheet
Disclosed each method, step and logic diagram in invention embodiment.General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.The step of method with reference to disclosed in embodiment of the present invention, can direct body
Completion now is performed for hardware decoding processor, or completion is performed with the hardware in decoding processor and software module combination.It is soft
Part module can be located at random access memory, and flash memory, read-only storage, programmable read only memory or electrically erasable programmable are deposited
In the ripe storage medium in this areas such as reservoir, register.The storage medium is located at memory 100, and processor 101 reads storage
Information in device 100, with reference to its hardware complete aforementioned embodiments method the step of.
The computer of the authentication method of data source equipment that the embodiment of the present invention is provided a kind of, device and the network equipment
Program product, including the computer-readable recording medium of program code is stored, the instruction that described program code includes can be used for
The method described in previous methods embodiment is performed, specific implementation can be found in embodiment of the method, will not be repeated here.
If the function is realized in the form of SFU software functional unit and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially in other words
The part to be contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are causing a computer equipment (can be
People's computer, server, or network equipment etc.) perform all or part of step of each embodiment methods described of the present invention.
And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with the medium of store program codes.
Finally it should be noted that:Embodiment described above, it is only the embodiment of the present invention, to illustrate the present invention
Technical scheme, rather than its limitations, protection scope of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, it will be understood by those within the art that:Any one skilled in the art
The invention discloses technical scope in, it can still modify to the technical scheme described in previous embodiment or can be light
Change is readily conceivable that, or equivalent substitution is carried out to which part technical characteristic;And these modifications, change or replacement, do not make
The essence of appropriate technical solution departs from the spirit and scope of technical scheme of the embodiment of the present invention, should all cover the protection in the present invention
Within the scope of.Therefore, protection scope of the present invention described should be defined by scope of the claims.
Claims (10)
1. a kind of authentication method of data source equipment, it is characterised in that methods described is applied to the network equipment, and the network is set
The key matched with the network equipment is pre-saved in standby, methods described includes:
Receive the packet from external network;
The packet is parsed, obtains the clear data in the packet, signature value and send the source of the packet setting
Standby mark;
Obtain the informative abstract of the clear data;
The signature value is decrypted according to the mark of the source device;
According to the informative abstract of decrypted result and the clear data, identifying whether for source device described in certification is legal.
2. according to the method for claim 1, it is characterised in that the step of the informative abstract for obtaining the clear data
Suddenly, including:
The informative abstract for obtaining the clear data is calculated using SM3 hash algorithms, described information summary includes cryptographic Hash.
3. according to the method for claim 1, it is characterised in that the key includes unsymmetrical key pair;It is described asymmetric
Public key in key includes the mark of the network equipment;
The step of signature value is decrypted the mark according to the source device, including:By the source device
Mark as public key, the signature value is decrypted using SM9 algorithms, obtains cryptographic Hash corresponding to the signature value;Institute
Stating the mark of source device includes the MAC Address of the source device.
4. according to the method for claim 3, it is characterised in that the information according to decrypted result and the clear data
Summary, source device described in certification identify whether legal step, including:
It is whether consistent with the cryptographic Hash of the clear data to compare cryptographic Hash corresponding to the signature value;
If it is, determining that the source device of the packet matches with the mark, the mark is legal;
If not, determining that the source device of the packet and the mark mismatch, the mark is illegal.
5. according to the method for claim 3, it is characterised in that the generating process of the packet is as follows:
The source device obtains clear data;
The source device calculates the cryptographic Hash for obtaining the clear data using SM3 hash algorithms;
Private key in the unsymmetrical key that the source device passes through preservation, the cryptographic Hash is signed using SM9 algorithms,
Obtain signature value;
The clear data and the signature value are packaged processing, generate packet.
6. a kind of authentication device of data source equipment, it is characterised in that described device is arranged at the network equipment, and the network is set
The key matched with the network equipment is pre-saved in standby, described device includes:
Receiving module, for receiving the packet from external network;
Parsing module, for parsing the packet, obtain the clear data in the packet, signature value and send the number
According to the mark of the source device of bag;
Summary acquisition module, for obtaining the informative abstract of the clear data;
Deciphering module, the signature value is decrypted for the mark according to the source device;
Authentication module, for the informative abstract according to decrypted result and the clear data, the mark of source device described in certification
It is whether legal.
7. device according to claim 6, it is characterised in that the summary acquisition module, be additionally operable to:
The informative abstract for obtaining the clear data is calculated using SM3 hash algorithms, described information summary includes cryptographic Hash.
8. device according to claim 6, it is characterised in that the key includes unsymmetrical key pair;It is described asymmetric
Public key in key includes the mark of the network equipment;
The deciphering module is additionally operable to:Using the mark of the source device as public key, the signature value is entered using SM9 algorithms
Row decryption, obtains cryptographic Hash corresponding to the signature value;The mark of the source device is with including the MAC of the source device
Location.
9. device according to claim 8, it is characterised in that the authentication module, including:
It is whether consistent with the cryptographic Hash of the clear data to compare cryptographic Hash corresponding to the signature value;
If it is, determining that the source device of the packet matches with the mark, the mark is legal;
If not, determining that the source device of the packet and the mark mismatch, the mark is illegal.
A kind of 10. network equipment, it is characterised in that including processor and machinable medium, the machine readable storage
Media storage has can be by the machine-executable instruction of the computing device, and machine described in the computing device is executable to be referred to
Make to realize the method described in any one of claim 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710977885.4A CN107579999A (en) | 2017-10-17 | 2017-10-17 | Authentication method, device and the network equipment of data source equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710977885.4A CN107579999A (en) | 2017-10-17 | 2017-10-17 | Authentication method, device and the network equipment of data source equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107579999A true CN107579999A (en) | 2018-01-12 |
Family
ID=61037913
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710977885.4A Pending CN107579999A (en) | 2017-10-17 | 2017-10-17 | Authentication method, device and the network equipment of data source equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107579999A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064599A (en) * | 2018-07-27 | 2018-12-21 | 新华三技术有限公司 | Purview certification method and device |
CN111680334A (en) * | 2020-06-11 | 2020-09-18 | 深圳市网心科技有限公司 | Disk security access method, device, equipment and medium |
CN113055397A (en) * | 2021-03-29 | 2021-06-29 | 郑州中科集成电路与信息系统产业创新研究院 | Configuration method and device of security access control policy |
WO2022227739A1 (en) * | 2021-04-28 | 2022-11-03 | Oppo广东移动通信有限公司 | Data encryption method and apparatus, data decryption method and apparatus, and device and storage medium |
WO2023051510A1 (en) * | 2021-09-28 | 2023-04-06 | 华为技术有限公司 | Communication method and apparatus |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101588245A (en) * | 2009-06-24 | 2009-11-25 | 成都市华为赛门铁克科技有限公司 | A kind of method of authentication, system and memory device |
CN101626294A (en) * | 2008-07-07 | 2010-01-13 | 华为技术有限公司 | Certifying method based on identity, method, equipment and system for secure communication |
WO2012108869A1 (en) * | 2011-02-10 | 2012-08-16 | Hewlett-Packard Development Company, L.P. | Systems, methods, and apparatus to authenticate communications modules |
CN103313237A (en) * | 2013-04-19 | 2013-09-18 | 无锡成电科大科技发展有限公司 | Method and system for interaction between mobile cloud terminal and cloud server |
CN104202170A (en) * | 2014-09-22 | 2014-12-10 | 上海众人科技有限公司 | Identity authentication system and method based on identifiers |
CN105553951A (en) * | 2015-12-08 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Data transmission method and data transmission device |
KR101714742B1 (en) * | 2015-10-22 | 2017-03-10 | 고려대학교 산학협력단 | Authentication method and server for remote control |
-
2017
- 2017-10-17 CN CN201710977885.4A patent/CN107579999A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101626294A (en) * | 2008-07-07 | 2010-01-13 | 华为技术有限公司 | Certifying method based on identity, method, equipment and system for secure communication |
CN101588245A (en) * | 2009-06-24 | 2009-11-25 | 成都市华为赛门铁克科技有限公司 | A kind of method of authentication, system and memory device |
WO2012108869A1 (en) * | 2011-02-10 | 2012-08-16 | Hewlett-Packard Development Company, L.P. | Systems, methods, and apparatus to authenticate communications modules |
CN103313237A (en) * | 2013-04-19 | 2013-09-18 | 无锡成电科大科技发展有限公司 | Method and system for interaction between mobile cloud terminal and cloud server |
CN104202170A (en) * | 2014-09-22 | 2014-12-10 | 上海众人科技有限公司 | Identity authentication system and method based on identifiers |
KR101714742B1 (en) * | 2015-10-22 | 2017-03-10 | 고려대학교 산학협력단 | Authentication method and server for remote control |
CN105553951A (en) * | 2015-12-08 | 2016-05-04 | 腾讯科技(深圳)有限公司 | Data transmission method and data transmission device |
Non-Patent Citations (1)
Title |
---|
贾铁军: "《网络安全技术及应用实践教程》", 31 January 2016 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109064599A (en) * | 2018-07-27 | 2018-12-21 | 新华三技术有限公司 | Purview certification method and device |
CN111680334A (en) * | 2020-06-11 | 2020-09-18 | 深圳市网心科技有限公司 | Disk security access method, device, equipment and medium |
CN111680334B (en) * | 2020-06-11 | 2023-05-09 | 深圳市网心科技有限公司 | Disk security access method, device, equipment and medium |
CN113055397A (en) * | 2021-03-29 | 2021-06-29 | 郑州中科集成电路与信息系统产业创新研究院 | Configuration method and device of security access control policy |
WO2022227739A1 (en) * | 2021-04-28 | 2022-11-03 | Oppo广东移动通信有限公司 | Data encryption method and apparatus, data decryption method and apparatus, and device and storage medium |
WO2023051510A1 (en) * | 2021-09-28 | 2023-04-06 | 华为技术有限公司 | Communication method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107579999A (en) | Authentication method, device and the network equipment of data source equipment | |
CN104184713B (en) | Terminal identification method, machine identifier register method and corresponding system, equipment | |
US11070542B2 (en) | Systems and methods for certificate chain validation of secure elements | |
CN107770159B (en) | Vehicle accident data recording method and related device and readable storage medium | |
CN110401615B (en) | Identity authentication method, device, equipment, system and readable storage medium | |
US20100169650A1 (en) | Storage minimization technique for direct anonymous attestation keys | |
CN107493273A (en) | Identity identifying method, system and computer-readable recording medium | |
CN105391695B (en) | A kind of terminal registration method and method of calibration | |
US10009343B2 (en) | Method, apparatus, and system for authenticating fully homomorphic message | |
CN109818730B (en) | Blind signature acquisition method and device and server | |
CN108173659B (en) | Certificate management method and system based on UKEY equipment and terminal equipment | |
CN110149209B (en) | Internet of things equipment and method and device for improving data transmission safety of Internet of things equipment | |
CN108551392A (en) | A kind of Proxy Signature generation method and system based on SM9 digital signature | |
CN108494783A (en) | The guard method of high in the clouds data | |
WO2015003503A1 (en) | Network device, terminal device and information security improving method | |
CN109858255A (en) | Data encryption storage method, device and realization device | |
US10833849B2 (en) | Unified secure device provisioning | |
CN111131416A (en) | Business service providing method and device, storage medium and electronic device | |
CN112380584B (en) | Block chain data updating method and device, electronic equipment and storage medium | |
CN115580396B (en) | Tight trace query system and method | |
KR101004829B1 (en) | An apparatus and method for direct anonymous attestation from bilinear maps | |
WO2020102974A1 (en) | Data access method, data access apparatus, and mobile terminal | |
US9509665B2 (en) | Protecting against malicious modification in cryptographic operations | |
KR101253683B1 (en) | Digital Signing System and Method Using Chained Hash | |
JP2019154055A5 (en) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180112 |
|
RJ01 | Rejection of invention patent application after publication |