CN112243233A - CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol - Google Patents
CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol Download PDFInfo
- Publication number
- CN112243233A CN112243233A CN202011229592.6A CN202011229592A CN112243233A CN 112243233 A CN112243233 A CN 112243233A CN 202011229592 A CN202011229592 A CN 202011229592A CN 112243233 A CN112243233 A CN 112243233A
- Authority
- CN
- China
- Prior art keywords
- ctid
- data
- module
- verification
- dimensional code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a CTID (computer telephony integration) verification method based on a Bluetooth low-power-consumption protocol, which comprises the following steps of: the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal; the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel; and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.
Description
Technical Field
The invention relates to a CTID (computer telephony integration) verification method and device based on a Bluetooth low-power protocol, and belongs to the technical field of Bluetooth and network authentication two-dimensional codes.
Background
The CTID (network certificate) is a network identity authentication certificate, is an electronic encryption file issued by a public security organization for promoting social administration and police service convenience and depends on the Internet and a credible identity authentication platform; the identification card of citizen and portrait are authenticated by CTID center (credible identity authentication platform) to generate unique BID value (individual unique identification) for identifying user identity. At present, the prior art of verifying the identity of a user through a CTID (network card two-dimensional code) exists, for example, an intelligent lock system and an unlocking method which are disclosed with application number "201811253711.4" and adopt a CTID electronic identity card to unlock the lock, and the intelligent lock system and the unlocking method disclose that the identity information of an unlocking person is verified in a mode of scanning the CTID two-dimensional code through an intelligent door lock, and the prior art mostly adopts an identity verification mode which is the same as the above scheme, namely, identity verification is carried out in a mode of scanning the CTID;
the above prior art has the following problems:
1. a code scanning module needs to be additionally arranged on hardware, so that the size and the cost of the hardware are greatly increased;
2. the CTID two-dimensional code needs to be presented for verification, the accuracy and time are needed for two-dimensional code identification, and the verification time is greatly increased if code scanning fails;
3. the network certificate two-dimensional code is used as an image data carrier, carries more data information and is easy to steal or crack in the display process.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a CTID verification method based on a Bluetooth low-power-consumption protocol, the CTID is transmitted in a Bluetooth mode for verification, a two-dimensional code graph of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved.
The technical scheme of the invention is as follows:
the first technical scheme is as follows:
a CTID (computer telephony integration) verification method based on a Bluetooth low-power protocol comprises the following steps:
the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal;
the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel;
and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.
Further, the step of converting the CTID to be verified into a data stream by the slave end and transmitting the data stream to be verified to the host end through the data channel specifically includes:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
Further, the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
Further, the specific steps of the host computer performing verification on the data stream and outputting a verification result are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
The second technical scheme is as follows:
a CTID verification device based on a Bluetooth low-power protocol comprises:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
Further, the bluetooth low energy communication module is a bluetooth 4.2-5.0 communication module.
Further, the slave computer side obtains CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
Further, the main control module further includes:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
The invention has the following beneficial effects:
1. according to the CTID checking method based on the Bluetooth low-power-consumption protocol, the CTID is transmitted in a Bluetooth mode for checking, a two-dimensional code graph of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved.
2. The CTID verification method based on the Bluetooth low-power-consumption protocol uses the Bluetooth low-power-consumption protocol, and improves the transmission capability and the transmission encryption capability of the CTID with larger capacity.
3. The invention discloses a CTID verification device based on a Bluetooth low-power protocol, which solves the problem that the conventional common Bluetooth module cannot process a network authentication two-dimensional code.
Drawings
FIG. 1 is a flow chart of an embodiment of the present invention;
fig. 2 is a schematic block diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the specific embodiments.
The first embodiment is as follows:
referring to fig. 1, a CTID verification method based on a bluetooth low energy protocol includes the following steps:
bluetooth match, host side, for example: the embodiment of the invention relates to a gate, an intelligent door lock, a check-in device and the like, wherein the gate is taken as an example, Bluetooth broadcast information is sent based on a Bluetooth 4.2-5.0 low-power-consumption protocol, the slave terminal scans the broadcast information of a host terminal and can be a mobile terminal such as a mobile phone and a tablet, and the embodiment takes the mobile phone as an example, and a data channel is established between the mobile phone and the gate;
data transmission, wherein a user accesses a CTID server through a mobile phone to upload identity information (an identity card and face information), the CTID server generates a BID value according to the identity information, encrypts the identity information and the BID value through a national secret SM4 key, digitally signs the whole data containing the identity information and the BID value through a national secret SM2 key, generates a two-dimensional code layout drawing of the CTID according to the code making rule of the CTID and transmits the two-dimensional code layout drawing back to the mobile phone, and the mobile phone converts the two-dimensional code layout drawing (ASCII code character text) of the CTID to be verified into byte array data stream and transmits the data stream to be verified to a gate through a data channel;
data verification, namely after the gate receives the byte array data stream, restoring the data stream into an ASCII code character text string, verifying and decrypting by calling a national secret key in a security chip arranged in the gate to obtain identity information and a BID value, verifying the identity information and the BID value of a user which can enter the gate and is stored in the gate body, and outputting a verification result; the verification result can be logically processed by combining with the upper service logic.
Further, the step of converting the CTID to be verified into a data stream by the slave end and transmitting the data stream to be verified to the host end through the data channel specifically includes:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
Further, the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
Further, the specific steps of the host computer performing verification on the data stream and outputting a verification result are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
In the embodiment, the CTID is transmitted in a Bluetooth mode for verification, so that a two-dimensional code image of the CTID cannot be leaked in the transmission process, and the safety of a service processing process is improved; meanwhile, the low-power-consumption Bluetooth protocol is used, so that the transmission capability and the transmission encryption capability of the CTID with larger capacity are improved.
The second implementation:
referring to fig. 2, a CTID verification apparatus based on bluetooth low energy protocol includes:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
Further, the bluetooth low energy communication module is a bluetooth 4.2-5.0 communication module.
Further, the slave computer side obtains CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
Further, the main control module further includes:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
This embodiment provides a bluetooth device that can check CTID, has solved the problem that current ordinary bluetooth module can't handle the net card two-dimensional code.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (8)
1. A CTID (computer telephony integration) verification method based on a Bluetooth low-power protocol is characterized by comprising the following steps of:
the method comprises the following steps that Bluetooth matching is carried out, a host terminal sends out Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, and a data channel is established between a slave terminal and the host terminal by scanning the broadcast information of the host terminal through the slave terminal;
the data transmission, the slave end converts the CTID to be checked into data flow, and transmits the data flow to be checked to the host end through a data channel;
and (4) data verification, wherein the host computer performs verification on the data stream and outputs a verification result.
2. The CTID verification method based on bluetooth low energy protocol as claimed in claim 1, wherein the step of converting the CTID to be verified by the slave end into a data stream and transmitting the data stream to be verified to the host end through the data channel specifically comprises:
the data channel is a predefined uuid channel; presetting a maximum mtu value;
sub-packaging the CTID data at the slave end according to the size of the CTID data and the size of mtu;
and performing point-to-point data transmission between the slave end and the host end according to a client/server mode through the uuid channel.
3. The CTID (computer telephony integration) verification method based on the Bluetooth low-power-consumption protocol as claimed in claim 1, wherein the slave side obtains the CTID data to be verified by accessing the CTID server, and the specific steps are as follows:
the slave computer accesses the CTID server and uploads user data;
the CTID server encrypts data containing identity information in the user data through an encryption algorithm;
the CTID server carries out digital signature on the whole user data through an encryption algorithm;
the CTID server generates a CTID two-dimensional code layout according to the CTID code manufacturing specification, and a watermark containing safety information is added in the two-dimensional code layout;
and the CTID server sends the two-dimensional code layout of the CTID to the slave end.
4. The CTID (computer telephony integration) verification method based on the Bluetooth low-power-consumption protocol as claimed in claim 3, wherein the specific steps of verifying the data stream and outputting the verification result by the host are as follows:
restoring a two-dimensional code layout diagram of the CTID through a code making specification of the CTID and a data stream;
acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
acquiring user data through the restored two-dimensional code layout drawing of the CTID, and verifying the digital signature of the user data;
and decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
5. A CTID verification device based on a Bluetooth low-power protocol is characterized by comprising:
the Bluetooth low-power-consumption communication module is used as a host end to send Bluetooth broadcast information based on a Bluetooth low-power-consumption protocol, establishes a data channel with a slave end and receives a data stream containing a CTID to be verified, which is sent by the slave end;
the security module is used for decryption operation;
the output module is used for outputting the verification result;
and the main control module is used for calling the security module to decrypt the CTID data to be verified, acquiring the identity information in the CTID, verifying the identity information with the locally stored identity information, and calling the output module to output a verification result.
6. The CTID verification device based on Bluetooth low energy protocol as claimed in claim 5, wherein: the Bluetooth low-power consumption communication module is a Bluetooth 4.2-5.0 communication module.
7. The CTID verification device based on Bluetooth low energy protocol as claimed in claim 5, wherein: the slave computer end acquires CTID data to be checked by accessing the CTID server, and accesses the CTID server and uploads user data; the CTID server specifically comprises:
the encryption module is used for encrypting the data containing the identity information in the user data through an encryption algorithm;
the signature module is used for carrying out digital signature on the whole user data;
the code generation module is used for generating a two-dimensional code layout drawing of the CTID in a CTID code making standard mode and adding a watermark containing safety information in the two-dimensional code layout drawing;
and the transmission module is used for sending the two-dimensional code layout of the CTID to the slave end.
8. The CTID verification apparatus based on bluetooth low energy protocol as claimed in claim 7, wherein the main control module further comprises:
the data reduction module is used for carrying out data reduction according to the code making specification of the CTID and the data stream to obtain a two-dimensional code layout diagram of the CTID;
the watermark verification module is used for acquiring a watermark containing safety information through the restored two-dimensional code layout diagram of the CTID and verifying the validity of the watermark;
the security module specifically comprises:
the signature checking module is used for acquiring user data through the restored two-dimensional code layout drawing of the CTID and checking a digital signature of the user data;
and the decryption module is used for decrypting the encrypted data in the user data through an encryption algorithm to obtain the identity information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011229592.6A CN112243233A (en) | 2020-11-06 | 2020-11-06 | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011229592.6A CN112243233A (en) | 2020-11-06 | 2020-11-06 | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112243233A true CN112243233A (en) | 2021-01-19 |
Family
ID=74169978
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011229592.6A Pending CN112243233A (en) | 2020-11-06 | 2020-11-06 | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112243233A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112907790A (en) * | 2021-02-07 | 2021-06-04 | 新大陆(福建)公共服务有限公司 | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code |
CN112965762A (en) * | 2021-03-19 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | Access control management method and system based on double APP architectures |
CN112968791A (en) * | 2021-01-20 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | CTID intelligent access control external usb network card communication method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108683438A (en) * | 2018-07-26 | 2018-10-19 | 咪付(广州)网络科技有限公司 | Non- visible safety Transmission system based on Quick Response Code and method |
CN109246668A (en) * | 2018-09-07 | 2019-01-18 | 国网江苏省电力有限公司苏州供电分公司 | A kind of communication equipment and a kind of substation equipment detection system using it |
CN109618346A (en) * | 2019-01-29 | 2019-04-12 | 盐城骏拔汽车零部件有限公司 | Vehicle access control system and method |
CN110211261A (en) * | 2019-04-28 | 2019-09-06 | 新大陆(福建)公共服务有限公司 | A kind of intelligent door lock method for unlocking and system based on two dimensional code |
CN110222809A (en) * | 2019-04-28 | 2019-09-10 | 新大陆(福建)公共服务有限公司 | A kind of information combination of two dimensional code and encryption method and two dimensional code encryption equipment |
-
2020
- 2020-11-06 CN CN202011229592.6A patent/CN112243233A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108683438A (en) * | 2018-07-26 | 2018-10-19 | 咪付(广州)网络科技有限公司 | Non- visible safety Transmission system based on Quick Response Code and method |
CN109246668A (en) * | 2018-09-07 | 2019-01-18 | 国网江苏省电力有限公司苏州供电分公司 | A kind of communication equipment and a kind of substation equipment detection system using it |
CN109618346A (en) * | 2019-01-29 | 2019-04-12 | 盐城骏拔汽车零部件有限公司 | Vehicle access control system and method |
CN110211261A (en) * | 2019-04-28 | 2019-09-06 | 新大陆(福建)公共服务有限公司 | A kind of intelligent door lock method for unlocking and system based on two dimensional code |
CN110222809A (en) * | 2019-04-28 | 2019-09-10 | 新大陆(福建)公共服务有限公司 | A kind of information combination of two dimensional code and encryption method and two dimensional code encryption equipment |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112968791A (en) * | 2021-01-20 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | CTID intelligent access control external usb network card communication method and system |
CN112968791B (en) * | 2021-01-20 | 2022-08-05 | 福建新大陆通信科技股份有限公司 | CTID intelligent access control external usb network card communication method and system |
CN112907790A (en) * | 2021-02-07 | 2021-06-04 | 新大陆(福建)公共服务有限公司 | Method, device and medium for unlocking Bluetooth door lock by trusted digital identity two-dimensional code |
CN112965762A (en) * | 2021-03-19 | 2021-06-15 | 福建新大陆通信科技股份有限公司 | Access control management method and system based on double APP architectures |
CN112965762B (en) * | 2021-03-19 | 2023-05-02 | 福建新大陆通信科技股份有限公司 | Access control management method and system based on double APP architecture |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10681025B2 (en) | Systems and methods for securely managing biometric data | |
US7020773B1 (en) | Strong mutual authentication of devices | |
CN110868301B (en) | Identity authentication system and method based on state cryptographic algorithm | |
CN112243233A (en) | CTID (computer telephony integration) verification method and device based on Bluetooth low-power-consumption protocol | |
CN104270338A (en) | A method and system of electronic identity registration and authentication login | |
CN109617675B (en) | Method and system for authenticating identifiers of both sides between charge and discharge facility and user terminal | |
MX2015002929A (en) | Method and system for verifying an access request. | |
WO2012024872A1 (en) | Method, system and related apparatus for encrypting communication in mobile internet | |
CN101964805B (en) | Method, equipment and system for safely sending and receiving data | |
CN101206542B (en) | Ciphering signature writing pad with press keys and display screen | |
CN110225014B (en) | Internet of things equipment identity authentication method based on fingerprint centralized issuing mode | |
CN113452687B (en) | Method and system for encrypting sent mail based on quantum security key | |
CN105281902A (en) | Web system safety login method based on mobile terminal | |
CN102468962A (en) | Method for personal identity authentication utilizing a personal cryptographic device | |
CN106789977B (en) | Method and system for realizing mobile phone token based on key segmentation | |
CN116709325B (en) | Mobile equipment security authentication method based on high-speed encryption algorithm | |
CN112381970A (en) | Intelligent door lock control method and system based on Bluetooth and CTID | |
CN116049792A (en) | Face registration and recognition method and face data protection system | |
CN113438074B (en) | Decryption method of received mail based on quantum security key | |
CN111541708A (en) | Identity authentication method based on power distribution | |
US11343078B2 (en) | System and method for secure input at a remote service | |
KR102476270B1 (en) | Wearalble device, authentication method thereof, and authentication method of authentication sever | |
KR20180117858A (en) | A Encrypted Communication System Based on a Quantum Cryptography and a Certificating Method by the Same | |
CN102143486A (en) | Method for realizing cellphone encrypted communication by using memory card | |
CN1889420A (en) | Method for realizing encrypting |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |