CN112243233A - CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol - Google Patents

CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol Download PDF

Info

Publication number
CN112243233A
CN112243233A CN202011229592.6A CN202011229592A CN112243233A CN 112243233 A CN112243233 A CN 112243233A CN 202011229592 A CN202011229592 A CN 202011229592A CN 112243233 A CN112243233 A CN 112243233A
Authority
CN
China
Prior art keywords
ctid
data
module
verification
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011229592.6A
Other languages
Chinese (zh)
Inventor
林龙
林海堤
李源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Newland Fujian Public Service Co ltd
Original Assignee
Newland Fujian Public Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Newland Fujian Public Service Co ltd filed Critical Newland Fujian Public Service Co ltd
Priority to CN202011229592.6A priority Critical patent/CN112243233A/en
Publication of CN112243233A publication Critical patent/CN112243233A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a CTID (computer telephony integration) verification method based on a Bluetooth low-power-consumption protocol, which comprises the following steps of: the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal; the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel; and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.

Description

CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol
Technical Field
The invention relates to a CTID (computer telephony integration) verification method and device based on a Bluetooth low-power protocol, and belongs to the technical field of Bluetooth and network authentication two-dimensional codes.
Background
The CTID (network certificate) is a network identity authentication certificate, is an electronic encryption file issued by a public security organization for promoting social administration and police service convenience and depends on the Internet and a credible identity authentication platform; the identification card of citizen and portrait are authenticated by CTID center (credible identity authentication platform) to generate unique BID value (individual unique identification) for identifying user identity. At present, the prior art of verifying the identity of a user through a CTID (network card two-dimensional code) exists, for example, an intelligent lock system and an unlocking method which are disclosed with application number "201811253711.4" and adopt a CTID electronic identity card to unlock the lock, and the intelligent lock system and the unlocking method disclose that the identity information of an unlocking person is verified in a mode of scanning the CTID two-dimensional code through an intelligent door lock, and the prior art mostly adopts an identity verification mode which is the same as the above scheme, namely, identity verification is carried out in a mode of scanning the CTID;
the above prior art has the following problems:
1. a code scanning module needs to be additionally arranged on hardware, so that the size and the cost of the hardware are greatly increased;
2. the CTID two-dimensional code needs to be presented for verification, the accuracy and time are needed for two-dimensional code identification, and the verification time is greatly increased if code scanning fails;
3. the network certificate two-dimensional code is used as an image data carrier, carries more data information and is easy to steal or crack in the display process.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a CTID verification method based on a Bluetooth low-power-consumption protocol, the CTID is transmitted in a Bluetooth mode for verification, a two-dimensional code graph of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved.
The technical scheme of the invention is as follows:
the first technical scheme is as follows:
a CTID (computer telephony integration) verification method based on a Bluetooth low-power protocol comprises the following steps:
the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal;
the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel;
and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.
Further, the step of converting the CTID to be verified into a data stream by the slave end and transmitting the data stream to be verified to the host end through the data channel specifically includes:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
Further, the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
Further, the specific steps of the host computer performing verification on the data stream and outputting a verification result are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
The second technical scheme is as follows:
a CTID verification device based on a Bluetooth low-power protocol comprises:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
Further, the bluetooth low energy communication module is a bluetooth 4.2-5.0 communication module.
Further, the slave computer side obtains CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
Further, the main control module further includes:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
The invention has the following beneficial effects:
1. according to the CTID checking method based on the Bluetooth low-power-consumption protocol, the CTID is transmitted in a Bluetooth mode for checking, a two-dimensional code graph of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved.
2. The CTID verification method based on the Bluetooth low-power-consumption protocol uses the Bluetooth low-power-consumption protocol, and improves the transmission capability and the transmission encryption capability of the CTID with larger capacity.
3. The invention discloses a CTID verification device based on a Bluetooth low-power protocol, which solves the problem that the conventional common Bluetooth module cannot process a network authentication two-dimensional code.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention;
fig. 2 is a schematic block diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the specific embodiments.
The first embodiment is as follows:
referring to fig. 1, a CTID verification method based on a bluetooth low energy protocol includes the following steps:
bluetooth match, host side, for example: the embodiment of the invention relates to a gate, an intelligent door lock, a check-in device and the like, wherein the gate is taken as an example, Bluetooth broadcast information is sent based on a Bluetooth 4.2-5.0 low-power-consumption protocol, the slave terminal scans the broadcast information of a host terminal and can be a mobile terminal such as a mobile phone and a tablet, and the embodiment takes the mobile phone as an example, and a data channel is established between the mobile phone and the gate;
data transmission, wherein a user accesses a CTID server through a mobile phone to upload identity information (an identity card and face information), the CTID server generates a BID value according to the identity information, encrypts the identity information and the BID value through a national secret SM4 key, digitally signs the whole data containing the identity information and the BID value through a national secret SM2 key, generates a two-dimensional code layout drawing of the CTID according to the code making rule of the CTID and transmits the two-dimensional code layout drawing back to the mobile phone, and the mobile phone converts the two-dimensional code layout drawing (ASCII code character text) of the CTID to be verified into byte array data stream and transmits the data stream to be verified to a gate through a data channel;
data verification, namely after the gate receives the byte array data stream, restoring the data stream into an ASCII code character text string, verifying and decrypting by calling a national secret key in a security chip arranged in the gate to obtain identity information and a BID value, verifying the identity information and the BID value of a user which can enter the gate and is stored in the gate body, and outputting a verification result; the verification result can be logically processed by combining with the upper service logic.
Further, the step of converting the CTID to be verified into a data stream by the slave end and transmitting the data stream to be verified to the host end through the data channel specifically includes:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
Further, the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
Further, the specific steps of the host computer performing verification on the data stream and outputting a verification result are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
In the embodiment, the CTID is transmitted in a Bluetooth mode for verification, so that a two-dimensional code image of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved; meanwhile, the low-power-consumption Bluetooth protocol is used, so that the transmission capability and the transmission encryption capability of the CTID with larger capacity are improved.
The second implementation:
referring to fig. 2, a CTID verification apparatus based on bluetooth low energy protocol includes:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
Further, the bluetooth low energy communication module is a bluetooth 4.2-5.0 communication module.
Further, the slave computer side obtains CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
Further, the main control module further includes:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
This embodiment provides a bluetooth device that can check CTID, has solved the problem that current ordinary bluetooth module can't handle the net card two-dimensional code.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A CTID (computer telephony integration) verification method based on a Bluetooth low-power protocol is characterized by comprising the following steps of:
the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal;
the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel;
and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.
2. The CTID verification method based on bluetooth low energy protocol as claimed in claim 1, wherein the step of converting the CTID to be verified by the slave end into a data stream and transmitting the data stream to be verified to the host end through the data channel specifically comprises:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
3. The CTID (computer telephony integration) verification method based on the Bluetooth low-power-consumption protocol as claimed in claim 1, wherein the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
4. The CTID (computer telephony integration) verification method based on the Bluetooth low-power-consumption protocol as claimed in claim 3, wherein the specific steps of verifying the data stream and outputting the verification result by the host are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
5. A CTID verification device based on a Bluetooth low-power protocol is characterized by comprising:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
6. The CTID verification device based on Bluetooth low energy protocol as claimed in claim 5, wherein: the Bluetooth low-power consumption communication module is a Bluetooth 4.2-5.0 communication module.
7. The CTID verification device based on Bluetooth low energy protocol as claimed in claim 5, wherein: the slave computer end acquires CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
8. The CTID verification apparatus based on bluetooth low energy protocol as claimed in claim 7, wherein the main control module further comprises:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
CN202011229592.6A 2020-11-06 2020-11-06 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol Pending CN112243233A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011229592.6A CN112243233A (en) 2020-11-06 2020-11-06 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011229592.6A CN112243233A (en) 2020-11-06 2020-11-06 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol

Publications (1)

Publication Number Publication Date
CN112243233A true CN112243233A (en) 2021-01-19

Family

ID=74169978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011229592.6A Pending CN112243233A (en) 2020-11-06 2020-11-06 CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol

Country Status (1)

Country Link
CN (1) CN112243233A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112907790A (en) * 2021-02-07 2021-06-04 新大陆(福建)公共服务有限公司 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code
CN112965762A (en) * 2021-03-19 2021-06-15 福建新大陆通信科技股份有限公司 Access control management method and system based on double APP architectures
CN112968791A (en) * 2021-01-20 2021-06-15 福建新大陆通信科技股份有限公司 CTID intelligent access control external usb network card communication method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683438A (en) * 2018-07-26 2018-10-19 咪付(广州)网络科技有限公司 Non- visible safety Transmission system based on Quick Response Code and method
CN109246668A (en) * 2018-09-07 2019-01-18 国网江苏省电力有限公司苏州供电分公司 A kind of communication equipment and a kind of substation equipment detection system using it
CN109618346A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle access control system and method
CN110211261A (en) * 2019-04-28 2019-09-06 新大陆(福建)公共服务有限公司 A kind of intelligent door lock method for unlocking and system based on two dimensional code
CN110222809A (en) * 2019-04-28 2019-09-10 新大陆(福建)公共服务有限公司 A kind of information combination of two dimensional code and encryption method and two dimensional code encryption equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108683438A (en) * 2018-07-26 2018-10-19 咪付(广州)网络科技有限公司 Non- visible safety Transmission system based on Quick Response Code and method
CN109246668A (en) * 2018-09-07 2019-01-18 国网江苏省电力有限公司苏州供电分公司 A kind of communication equipment and a kind of substation equipment detection system using it
CN109618346A (en) * 2019-01-29 2019-04-12 盐城骏拔汽车零部件有限公司 Vehicle access control system and method
CN110211261A (en) * 2019-04-28 2019-09-06 新大陆(福建)公共服务有限公司 A kind of intelligent door lock method for unlocking and system based on two dimensional code
CN110222809A (en) * 2019-04-28 2019-09-10 新大陆(福建)公共服务有限公司 A kind of information combination of two dimensional code and encryption method and two dimensional code encryption equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112968791A (en) * 2021-01-20 2021-06-15 福建新大陆通信科技股份有限公司 CTID intelligent access control external usb network card communication method and system
CN112968791B (en) * 2021-01-20 2022-08-05 福建新大陆通信科技股份有限公司 CTID intelligent access control external usb network card communication method and system
CN112907790A (en) * 2021-02-07 2021-06-04 新大陆(福建)公共服务有限公司 Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code
CN112965762A (en) * 2021-03-19 2021-06-15 福建新大陆通信科技股份有限公司 Access control management method and system based on double APP architectures
CN112965762B (en) * 2021-03-19 2023-05-02 福建新大陆通信科技股份有限公司 Access control management method and system based on double APP architecture

Similar Documents

Publication Publication Date Title
US10681025B2 (en) Systems and methods for securely managing biometric data
US7020773B1 (en) Strong mutual authentication of devices
CN110868301B (en) Identity authentication system and method based on state cryptographic algorithm
CN112243233A (en) CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol
CN104270338A (en) A method and system of electronic identity registration and authentication login
CN109617675B (en) Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal
MX2015002929A (en) Method and system for verifying an access request.
WO2012024872A1 (en) Method, system and related apparatus for encrypting communication in mobile internet
CN101964805B (en) Method, equipment and system for safely sending and receiving data
CN101206542B (en) Ciphering signature writing pad with press keys and display screen
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN113452687B (en) Method and system for encrypting sent mail based on quantum security key
CN105281902A (en) Web system safety login method based on mobile terminal
CN102468962A (en) Method for personal identity authentication utilizing a personal cryptographic device
CN106789977B (en) Method and system for realizing mobile phone token based on key segmentation
CN116709325B (en) Mobile equipment security authentication method based on high-speed encryption algorithm
CN112381970A (en) Intelligent door lock control method and system based on Bluetooth and CTID
CN116049792A (en) Face registration and recognition method and face data protection system
CN113438074B (en) Decryption method of received mail based on quantum security key
CN111541708A (en) Identity authentication method based on power distribution
US11343078B2 (en) System and method for secure input at a remote service
KR102476270B1 (en) Wearalble device, authentication method thereof, and authentication method of authentication sever
KR20180117858A (en) A Encrypted Communication System Based on a Quantum Cryptography and a Certificating Method by the Same
CN102143486A (en) Method for realizing cellphone encrypted communication by using memory card
CN1889420A (en) Method for realizing encrypting

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination