CN108471613B - Verification method of wireless router - Google Patents

Verification method of wireless router Download PDF

Info

Publication number
CN108471613B
CN108471613B CN201810269868.XA CN201810269868A CN108471613B CN 108471613 B CN108471613 B CN 108471613B CN 201810269868 A CN201810269868 A CN 201810269868A CN 108471613 B CN108471613 B CN 108471613B
Authority
CN
China
Prior art keywords
wireless router
verification
information
chip
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810269868.XA
Other languages
Chinese (zh)
Other versions
CN108471613A (en
Inventor
何欧翔
蔡燕
王刚
钟梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Southern Wallgreat Information Security Technology Co ltd
Hunan Dongfang Hualong Information Technology Co ltd
Original Assignee
Hunan Southern Wallgreat Information Security Technology Co ltd
Hunan Dongfang Hualong Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Southern Wallgreat Information Security Technology Co ltd, Hunan Dongfang Hualong Information Technology Co ltd filed Critical Hunan Southern Wallgreat Information Security Technology Co ltd
Priority to CN201810269868.XA priority Critical patent/CN108471613B/en
Publication of CN108471613A publication Critical patent/CN108471613A/en
Application granted granted Critical
Publication of CN108471613B publication Critical patent/CN108471613B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention provides a verification method of a wireless router, and belongs to the technical field of wireless communication. According to the verification method of the wireless router, the wireless router and the verification system thereof provided by the embodiment of the invention, the wireless router is internally provided with the embedded security chip, and the equipment information is signed by using a chip certificate private key stored in the embedded security chip; the signature data is transmitted to the AP equipment, so that the AP equipment carries out identity verification on the wireless router according to the signature data to judge the validity of the identity of the wireless router, and the security of the wireless router accessing to a network can be improved.

Description

Verification method of wireless router
Technical Field
The invention relates to the technical field of wireless communication, in particular to a verification method of a wireless router.
Background
When the Wireless router accesses the base station, a relay device, such as an AP (Wireless Access Point) device, is sometimes disposed between the Wireless router and the base station. The traditional interaction between the wireless router and the AP equipment has no verification process or simple verification process, and connection risks exist.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a verification method of a wireless router, which can improve the security of the wireless router accessing to a network.
In a first aspect, an embodiment of the present invention provides a method for verifying a wireless router, which is applied to a wireless router, where an embedded security chip is disposed in the wireless router; the method comprises the following steps:
acquiring equipment information of the wireless router;
signing the equipment information by using a chip certificate private key stored in the embedded security chip to obtain first signature data;
generating router verification information according to the first signature data;
and transmitting the router verification information to the AP equipment to which the wireless router is to be accessed, so that the AP equipment verifies the wireless router according to the first signature data.
With reference to the first aspect, an embodiment of the present invention provides a first possible implementation manner of the first aspect, where the step of generating router verification information according to the first signature data includes:
and combining the equipment information, the first signature data and the chip certificate data stored in the embedded security chip into router verification information.
With reference to the first aspect, an embodiment of the present invention provides a second possible implementation manner of the first aspect, where after the step of transmitting the router verification information to the AP device to which the wireless router intends to access, the method further includes:
receiving a connection response message returned by the AP equipment;
and accessing the AP equipment if the connection response message indicates that the verification is passed.
With reference to the first aspect, an embodiment of the present invention provides a third possible implementation manner of the first aspect, where the method further includes:
when user identity authentication information sent by a user terminal is received, signing the user identity authentication information and the equipment information by using a chip certificate private key stored in the embedded security chip to obtain second signature data;
generating terminal verification information according to the user identity verification information, the equipment information, the second signature data and chip certificate data stored in the embedded security chip, and sending the terminal verification information to a background verification server of the wireless router;
receiving a verification result returned by the background verification server;
and determining whether the user terminal is allowed to access according to the verification result.
With reference to the first aspect, an embodiment of the present invention provides a fourth possible implementation manner of the first aspect, where the method further includes:
when a management verification message sent by a management terminal is received, determining the integrity of a signature certificate in the management verification message;
if the signature certificate is complete, verifying third signature data in the management verification message by using the signature certificate;
and if the authentication is passed, allowing the management terminal to access the security configuration management system of the wireless router.
In a second aspect, an embodiment of the present invention further provides a wireless router, including a processor and an embedded security chip connected to the processor; the embedded security chip is used for storing a chip certificate private key and chip certificate data;
the processor is used for executing the program corresponding to the method.
In a third aspect, an embodiment of the present invention further provides a verification system for a wireless router, including an AP device and the wireless router; the wireless router is connected with a mobile network through the AP equipment;
the AP equipment is used for receiving the signature data sent by the wireless router and carrying out identity verification on the wireless router according to the signature data so as to determine whether the wireless router is added or not.
With reference to the third aspect, an embodiment of the present invention provides a first possible implementation manner of the third aspect, where the AP device is further configured to, after receiving router verification information, verify validity of chip certificate data and the first signature data in the router verification information, and determine whether to allow the wireless router to access according to a verification result.
With reference to the third aspect, an embodiment of the present invention provides a second possible implementation manner of the third aspect, where the system further includes: the system comprises a user terminal and a background authentication server; the user terminal and the background authentication server are both connected with the wireless router;
the wireless router verifies the identity information of the user terminal through the background verification server to determine whether the user terminal is allowed to access;
the background verification server is used for searching a chip certificate public key corresponding to the equipment information in the terminal verification information after receiving the terminal verification information sent by the wireless router, verifying the second signature data and the user identity verification information in the terminal verification information by using the searched chip certificate public key, verifying the validity of the chip certificate data in the terminal verification information, and returning a verification result to the wireless router.
With reference to the third aspect, an embodiment of the present invention provides a third possible implementation manner of the third aspect, where the system further includes a management terminal, where the management terminal is connected to the wireless router, and is configured to perform security configuration management on the wireless router after passing authentication; and the management terminal is connected with a safety management login device and is used for signing the identity information of the administrator.
The embodiment of the invention has the following beneficial effects:
according to the verification method of the wireless router, the wireless router and the verification system thereof provided by the embodiment of the invention, the wireless router is internally provided with the embedded security chip, and the equipment information is signed by using a chip certificate private key stored in the embedded security chip; the signature data is transmitted to the AP equipment, so that the AP equipment carries out identity verification on the wireless router according to the signature data to judge the validity of the identity of the wireless router, and the security of the wireless router accessing to a network can be improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an authentication method of a wireless router according to an embodiment of the present invention;
fig. 2 is an interaction diagram of a wireless router and an AP device according to an embodiment of the present invention;
fig. 3 is an interaction diagram of a user terminal and a wireless router according to an embodiment of the present invention;
fig. 4 is an interaction diagram of a management terminal and a wireless router according to an embodiment of the present invention;
fig. 5 is a block diagram of a wireless router according to an embodiment of the present invention;
fig. 6 is a block diagram of a verification system of a wireless router according to an embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the present invention provides a method for verifying a wireless router, a wireless router and a verification system thereof, which are used to solve the problem of connection risk of the existing wireless router.
Example one
The embodiment provides a verification method of a wireless router, which is applied to the wireless router. As shown in fig. 1, the method includes:
step S102, acquiring the equipment information of the wireless router.
And step S104, signing the equipment information by using a chip certificate private key stored in the embedded security chip to obtain first signature data.
And acquiring the equipment information of the wireless router from a specified storage area of the wireless router, and signing the acquired equipment information by using a chip certificate private key stored in the embedded security chip.
And step S106, generating router verification information according to the first signature data.
And combining the equipment information, the first signature data and the chip certificate data stored in the embedded security chip into router verification information.
Step S108, the router verification information is transmitted to the AP equipment to which the wireless router is to be accessed, so that the AP equipment verifies the wireless router according to the first signature data.
The AP equipment is relay equipment connected between the wireless router and the communication base station. As shown in fig. 2, the AP device receives router verification information sent by the wireless router, and verifies the validity of the chip certificate data and the first signature data in the router verification information, where the chip certificate data represents the identity of the wireless router, and verifies the validity of the chip certificate data, so as to determine the validity of the identity of the wireless router. And the AP equipment determines whether to allow the wireless router to access according to the verification result.
Optionally, the method further includes: the wireless router receives a connection response message returned by the AP equipment; and if the connection response message indicates that the verification is passed, accessing the AP equipment.
In the verification method of the wireless router provided by the embodiment of the invention, the wireless router is internally provided with an embedded security chip, and the equipment information is signed by using a chip certificate private key stored in the embedded security chip; the signature data is transmitted to the AP equipment, so that the AP equipment carries out identity verification on the wireless router according to the signature data to judge the validity of the identity of the wireless router, and the security of the wireless router accessing to a network can be improved.
The existing user terminal is easy to be cracked by only carrying out authentication in a password or user name plus password mode when accessing the wireless router. In an optional embodiment, the method further includes: when user identity authentication information sent by a user terminal is received, signing the user identity authentication information and equipment information by using a chip certificate private key stored in an embedded security chip to obtain second signature data; generating terminal verification information according to the user identity verification information, the equipment information, the second signature data and chip certificate data stored in the embedded security chip, and sending the terminal verification information to a background verification server of the wireless router; receiving a verification result returned by the background verification server; and determining whether to allow the user terminal to access according to the verification result.
Specifically, as shown in fig. 3, when a user terminal wants to access a wireless router, identity information of the user terminal is obtained first; signing the identity information by using a private key of a signature certificate of the user terminal; and generating user identity verification information according to the identity information, the signature result and the signature certificate, and sending the user identity verification information to the wireless router. The wireless router receives user identity authentication information sent by a user terminal, and signs the user identity authentication information and equipment information by using a chip certificate private key stored in the embedded security chip to obtain second signature data; and combining the user identity authentication information, the equipment information, the second signature data and the chip certificate data stored in the embedded security chip into terminal authentication information, and sending the terminal authentication information to a background authentication server of the wireless router. And the background server receives the terminal verification information sent by the wireless router, searches for a chip certificate public key corresponding to the equipment information, verifies the second signature data and the terminal verification information by using the searched chip certificate public key, verifies the validity of the chip certificate data, and returns a verification result to the wireless router. And the wireless router determines whether to allow the user terminal to access according to the verification result.
Compared with the existing password verification method, the method can verify the identity of the user terminal accessed to the wireless router, and improves the security.
Because the existing login strategy configuration is carried out by verifying the user name and the password, the user name and the password are easy to crack, and an illegal user modifies the security strategy of the wireless router. In another optional embodiment, the method may further include:
when the wireless router receives a management verification message sent by a management terminal, determining the integrity of a signature certificate in the management verification message; if the signature certificate is complete, verifying third signature data in the management verification message by using the signature certificate; and if the authentication is passed, allowing the management terminal to access the security configuration management system of the wireless router.
Specifically, as shown in fig. 4, an administrator may perform security configuration management on the wireless router through the management terminal. The management terminal can be a computer or a mobile terminal, and a safety management login device, such as a UKEY, is connected to the management terminal. The method comprises the steps that an administrator logs in a management interface of the wireless router through a management terminal, the management terminal obtains identity information of a safety management login device and calls a signature interface of the safety management login device, data signing is carried out through a signature private key corresponding to the safety management login device, a management verification message is generated according to the identity information, a signature result and a signature certificate of the safety management login device, and the management verification message is sent to the wireless router. The wireless router receives management verification information sent by a management terminal and determines the integrity of a signature certificate in the management verification information; if the signature certificate is complete, verifying third signature data in the management verification message by using the signature certificate; and if the verification is passed, allowing the management terminal to access a security configuration management system of the wireless router to adjust the security configuration parameters of the wireless router.
By the method, illegal users can be prevented from entering the security configuration management system of the wireless router and modifying the security policy of the wireless router.
Example two
The embodiment provides a wireless router, and as shown in fig. 5, the wireless router 5 includes a processor 51 and an embedded security chip 52 connected to the processor 51. The embedded security chip 52 is used to store the chip certificate private key and the chip certificate data.
The embedded security chip 52 is packaged in the wireless router 5, and a custom communication protocol is adopted between the embedded security chip 52 and the processor 51 to complete application, downloading and application of the chip certificate. The embedded security chip 52 provides functions of digital signature, signature verification and certificate validity verification, and guarantees security control of the wireless router through a PKI technology. The embedded security chip 52 supports the cryptographic algorithm (symmetric algorithm SM4, Hash algorithm SM3, asymmetric algorithm SM 2); the encryption key and the signature private key exist in an encryption storage area of the embedded chip, can only be used in the chip, and cannot be read from the outside to ensure the storage security of key data (symmetric key and private key).
The processor 51 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 51. The Processor 51 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. The processor 51 may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor.
EXAMPLE III
The present embodiment provides an authentication system of a wireless router, as shown in fig. 6, the system includes an AP device 3 and a wireless router 5; the wireless router 5 accesses the network through the AP device 3.
The AP device 3 is configured to receive the signature data sent by the wireless router 5, and authenticate the wireless router 5 according to the signature data to determine whether to allow the wireless router 5 to access. The AP device 3 is further configured to verify validity of the chip certificate data and the first signature data in the router verification information after receiving the router verification information, and determine whether to allow the wireless router 5 to access according to a verification result.
Optionally, the system may further include a user terminal 1 and a background authentication server 2. The user terminal 1 and the background authentication server 2 are both connected with the wireless router 5. The wireless router 5 verifies the identity information of the user terminal 1 through the background verification server 2 to determine whether to allow the user terminal 1 to access.
The background verification server 2 is configured to, after receiving the terminal verification information sent by the wireless router 5, search for a chip certificate public key corresponding to the device information in the terminal verification information, verify the second signature data and the user identity verification information in the terminal verification information by using the searched chip certificate public key, verify the validity of the chip certificate data in the terminal verification information, and return a verification result to the wireless router 5.
Optionally, the system further includes a management terminal 4, where the management terminal 4 is connected to the wireless router 5, and is configured to perform security configuration management on the wireless router 5 after passing the authentication; a security management login device, such as a UKEY, is connected to the management terminal 4. The safety management login device is used for signing the identity information of the administrator.
In the verification system of the wireless router provided by the embodiment of the invention, the wireless router is internally provided with an embedded security chip, and the equipment information is signed by using a chip certificate private key stored in the embedded security chip; the signature data is transmitted to the AP equipment, so that the AP equipment carries out identity verification on the wireless router according to the signature data to judge the validity of the identity of the wireless router, and the security of the wireless router accessing to a network can be improved. Meanwhile, the identity of the user terminal accessing the wireless router can be verified, and the security of the wireless router network is further improved. Moreover, the management terminal needs to install a security management login device to verify the identity of the administrator, so that an illegal user can be prevented from entering a security configuration management system of the wireless router and modifying the security policy of the wireless router.
The verification method of the wireless router, the wireless router and the verification system thereof provided by the embodiment of the invention have the same technical characteristics, so the same technical problems can be solved, and the same technical effects can be achieved.
It should be noted that, in the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided by the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. The verification method of the wireless router is characterized by being applied to the wireless router, wherein an embedded security chip is arranged in the wireless router; the method comprises the following steps:
acquiring equipment information of the wireless router;
signing the equipment information by using a chip certificate private key stored in the embedded security chip to obtain first signature data;
generating router verification information according to the first signature data;
transmitting the router verification information to the AP equipment to which the wireless router is to be accessed, so that the AP equipment verifies the wireless router according to the first signature data;
the step of generating router authentication information from the first signature data includes:
combining the equipment information, the first signature data and chip certificate data stored in the embedded security chip into router verification information;
a step for the AP device to authenticate the wireless router according to the first signature data, comprising:
verifying the validity of the chip certificate data and the first signature data in the router verification information; wherein the chip certificate data represents an identity of the wireless router.
2. The method of claim 1, wherein after the step of transmitting the router authentication information to the AP device to which the wireless router intends to access, the method further comprises:
receiving a connection response message returned by the AP equipment;
and accessing the AP equipment if the connection response message indicates that the verification is passed.
3. The method of claim 1, further comprising:
when user identity authentication information sent by a user terminal is received, signing the user identity authentication information and the equipment information by using a chip certificate private key stored in the embedded security chip to obtain second signature data;
generating terminal verification information according to the user identity verification information, the equipment information, the second signature data and chip certificate data stored in the embedded security chip, and sending the terminal verification information to a background verification server of the wireless router;
receiving a verification result returned by the background verification server;
and determining whether the user terminal is allowed to access according to the verification result.
4. The method of claim 1, further comprising:
when a management verification message sent by a management terminal is received, determining the integrity of a signature certificate in the management verification message;
if the signature certificate is complete, verifying third signature data in the management verification message by using the signature certificate;
and if the authentication is passed, allowing the management terminal to access the security configuration management system of the wireless router.
5. A wireless router is characterized by comprising a processor and an embedded security chip connected with the processor; the embedded security chip is used for storing a chip certificate private key and chip certificate data;
the processor is used for executing a program corresponding to the method of any one of the claims 1-4.
6. An authentication system of a wireless router, comprising an AP device and the wireless router of claim 5; the wireless router accesses a network through the AP equipment;
the AP equipment is used for receiving the signature data sent by the wireless router and carrying out identity verification on the wireless router according to the signature data so as to determine whether the wireless router is allowed to access.
7. The system according to claim 6, wherein the AP device is further configured to verify validity of the chip certificate data and the first signature data in the router verification information after receiving the router verification information, and determine whether to allow the wireless router to access according to a verification result.
8. The system of claim 6, further comprising: the system comprises a user terminal and a background authentication server; the user terminal and the background authentication server are both connected with the wireless router;
the wireless router verifies the identity information of the user terminal through the background verification server to determine whether the user terminal is allowed to access;
the background verification server is used for searching a chip certificate public key corresponding to the equipment information in the terminal verification information after receiving the terminal verification information sent by the wireless router, verifying the second signature data and the user identity verification information in the terminal verification information by using the searched chip certificate public key, verifying the validity of the chip certificate data in the terminal verification information, and returning a verification result to the wireless router.
9. The system according to claim 6, further comprising a management terminal, connected to the wireless router, for performing security configuration management on the wireless router after verification; and the management terminal is connected with a safety management login device and is used for signing the identity information of the administrator.
CN201810269868.XA 2018-03-28 2018-03-28 Verification method of wireless router Active CN108471613B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810269868.XA CN108471613B (en) 2018-03-28 2018-03-28 Verification method of wireless router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810269868.XA CN108471613B (en) 2018-03-28 2018-03-28 Verification method of wireless router

Publications (2)

Publication Number Publication Date
CN108471613A CN108471613A (en) 2018-08-31
CN108471613B true CN108471613B (en) 2021-05-04

Family

ID=63262241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810269868.XA Active CN108471613B (en) 2018-03-28 2018-03-28 Verification method of wireless router

Country Status (1)

Country Link
CN (1) CN108471613B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103079200B (en) * 2011-10-26 2016-08-03 国民技术股份有限公司 The authentication method of a kind of wireless access, system and wireless router
CN104410580B (en) * 2014-11-28 2018-09-14 深圳市华威世纪科技股份有限公司 Credible and secure WiFi routers and its data processing method
KR102444239B1 (en) * 2016-01-21 2022-09-16 삼성전자주식회사 Security Chip, Application Processor, Device including security Chip and Operating Method thereof
CN107241339B (en) * 2017-06-29 2020-03-03 北京小米移动软件有限公司 Identity authentication method, identity authentication device and storage medium

Also Published As

Publication number Publication date
CN108471613A (en) 2018-08-31

Similar Documents

Publication Publication Date Title
CN107770182B (en) Data storage method of home gateway and home gateway
WO2020134942A1 (en) Identity verification method and system therefor
KR102018971B1 (en) Method for enabling network access device to access wireless network access point, network access device, application server and non-volatile computer readable storage medium
CN110678770B (en) Positioning information verification
US20220394026A1 (en) Network identity protection method and device, and electronic equipment and storage medium
CN104184713B (en) Terminal identification method, machine identifier register method and corresponding system, equipment
CN101860540B (en) Method and device for identifying legality of website service
JP7421771B2 (en) Methods, application servers, IOT devices and media for implementing IOT services
WO2019085531A1 (en) Method and device for network connection authentication
US9445269B2 (en) Terminal identity verification and service authentication method, system and terminal
CN105188055A (en) Wireless network access method, wireless access point and server
KR20150036104A (en) Method, client, server and system of login verification
US9461995B2 (en) Terminal, network locking and network unlocking method for same, and storage medium
CN102271042A (en) Certificate authorization method, system, universal serial bus (USB) Key equipment and server
WO2014048749A1 (en) Inter-domain single sign-on
CN106559785B (en) Authentication method, device and system, access device and terminal
CN109861968A (en) Resource access control method, device, computer equipment and storage medium
CN112491829B (en) MEC platform identity authentication method and device based on 5G core network and blockchain
WO2016188053A1 (en) Wireless network access method, device, and computer storage medium
WO2019056971A1 (en) Authentication method and device
CN110166453A (en) A kind of interface authentication method, system and storage medium based on SE chip
CN111148094A (en) Registration method of 5G user terminal, user terminal equipment and medium
CN113094686A (en) Authentication method and related equipment, computer readable storage medium
CN112311769A (en) Method, system, electronic device and medium for security authentication
CN114339755A (en) Registration verification method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant