CN104767730A - Method for changing intelligent device into credible intelligent device - Google Patents
Method for changing intelligent device into credible intelligent device Download PDFInfo
- Publication number
- CN104767730A CN104767730A CN201510103782.6A CN201510103782A CN104767730A CN 104767730 A CN104767730 A CN 104767730A CN 201510103782 A CN201510103782 A CN 201510103782A CN 104767730 A CN104767730 A CN 104767730A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- private key
- app
- registration
- trc
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a method for changing an intelligent device into a credible intelligent device. The safety problem of an existing intelligent device is solved. The method comprises the following steps that firstly, installation time or hardware information is encrypted through a recognition code to form a TRC and stored in an APP; secondly, the hardware information or an installation recognition code is read when the APP is started; thirdly, a user scans a QR code and inputs a password logging into the APP; fourthly, the intelligent device reads and verifies the QR code, the installation recognition code is used for unlocking the TRC, and log-on information is encrypted and submitted to an identity authentication system; sixthly, the identity authentication system is encrypted, a secret key is formed and prestored, and the secret key is sent to the intelligent device; seventhly, the intelligent device sends a registration confirmation request to the identity authentication system; eighthly, the identity authentication system receives and unscrambles the registration confirmation information, the registration information is unloaded to an official registration table, and then registration is successful. The intelligent device used in daily life can become a credible device, identity authentication is carried out, and cost is saved.
Description
Technical field
The present invention relates to a kind of method that smart machine becomes trusted smart machine.
Background technology
Various smart machine from be born, just with its abundant function, friendly cross section, operate easily, and the feature such as carrying mode easily, won extensive acclaim, has captured rapidly market and achieved leapfrogging growth.Along with the progress of technology, new product continues to bring out, and cost performance improves day by day, facilitates a large amount of universal of various intelligent mobile terminal especially, also creates larger impact to the live and work mode of people gradually.
But the login mode of existing smart machine adopts account and password, centre can use the security tool such as certificate, U shield to ensure the safety of communication, and fail safe is lower, cannot meet the demand of current people.
Summary of the invention
The present invention is directed to the safety problem that smart machine exists, improve a kind of method smart machine being become trusted smart machine.
To achieve these goals, the technical solution used in the present invention is as follows:
Smart machine becomes a method for trusted smart machine, comprises the following steps:
(1) download, APP is installed, and generate installation identification code and set-up time;
(2) use installation identification code to encrypt set-up time formation TRC, or the hardware information formation TRC that identification code encrypts smart machine is installed in use;
(3) in configuration file TRC being kept at APP or Keystore;
(4) when starting APP, hardware information need be read or identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration;
Wherein, TRC is the packets of information of the encryption containing facility information and hardware information; OTA includes: the authority information of facility information, user profile and correspondence.
In addition, the QR code of QR code for the browser when logging in APP is shown.
When described smart machine is Android version, adopt following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) APP reads mainboard, CPU, the memory information of smart machine;
(3) use installation identification code encryption hardware information formation TRC, if cannot read hardware information, just practical identification code of installing encrypts set-up time formation TRC;
(4) in configuration file TRC being kept at APP or Keystore;
(5) when starting APP, all need to read hardware information;
(6) the QR code of scanning input registration, and input logs in the password of APP;
(7) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(8) smart machine encryption submits to log-on message to identity authorization system;
(9) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(10) smart machine checks private key and preserves private key;
(11) private key is used to generate the OTA confirming registration;
(12) confirmation registration request is sent to identity authorization system by smart machine;
(13) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
When described smart machine is ISO version, adopt following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) the installation identification code encryption set-up time is used to form TRC;
(3) TRC is kept in Keystore;
(4) when starting APP, all needing to read and identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
Further, described smart machine is mobile phone or pad.Certainly other portable smart machines also can.
The present invention compared with prior art, has the following advantages and beneficial effect:
The present invention can be real smart machine is become trusted device.Because the information of the information that smart machine uniquely identifies and hardware becomes the part all needing the authorization message of certification at every turn.If user has changed smart machine, and does not notify manager, even if so user has installed APP, conscientiously also cannot pass through.If user lost smart machine, the people finding smart machine also because of the password not logging in APP, and can cannot open APP, thus ensure that information and the property safety of user.
The present invention by smart machine (as mobile phone, flat board etc.) used in everyday for people is become a trusted device, thus carries out authentication, and so a kind of mode is that identity has conscientiously saved cost.Following authentication does not need the new equipment of extra interpolation more just can complete.Such mode also allows user's is simple to operate, and which ID authentication device need be entangled with this uses by mistake, and a conventional smart machine just can settle all authentications.
Embodiment
Below in conjunction with embodiment, the invention will be further described, and embodiments of the present invention include but not limited to the following example.
Embodiment
When user uses the smart machine of Android version, operating procedure is as follows:
(1) APP is downloaded in the website of specifying;
(2) APP is installed;
(3) generation is installed unique identifier by smart machine;
(4) APP will read the information such as mainboard, CPU, internal memory of smart machine at random;
(5) installation identification code encryption hardware information is used to form TRC; If read less than hardware information, the installation identification code encryption set-up time is just used to form TRC;
(6) in the TRC configuration file that is kept at APP or Keystore;
(7), during each startup APP, hardware information is read;
(8) the QR code of scanning input registration, and input logs in the password of APP;
(9) smart machine reads checking QR code;
(10) installation identification code is used to unlock TRC;
(11) smart machine encryption submits to log-on message to identity authorization system;
(12) identity authorization system forms private key according to certain format encryption;
(13) identity authorization system prestores private key, sends private key to smart machine;
(14) smart machine checks private key;
(15) smart machine preserves private key;
(16) private key is used to generate the OTA confirming registration;
(17) confirmation registration request is sent to identity authorization system by smart machine;
(18) identity authorization system receives and understands this registration confirmation;
(19) log-on message that identity authorization system unloading is corresponding is to official register table;
(20) return and succeed in registration.
When user uses the smart machine of ISO version, operating procedure is as follows:
(1) APP is downloaded;
(2) APP is installed;
(3) generation is installed unique identifier and set-up time by smart machine;
(4) the installation unique identifier encryption set-up time is used to form TRC;
(5) TRC is kept in Keystore;
(6), during each startup APP, read and identification code is installed;
(7) the QR code of scanning input registration, and input logs in the password of APP;
(8) smart machine reads checking QR code;
(9) installation identification code is used to unlock TRC;
(10) smart machine encryption submits to log-on message to identity authorization system;
(11) identity authorization system forms private key according to certain format encryption;
(12) identity authorization system prestores private key, sends private key to smart machine;
(13) smart machine checks private key;
(14) smart machine preserves private key;
(15) private key is used to generate the OTA confirming registration;
(16) confirmation registration request is sent to identity authorization system by smart machine;
(17) identity authorization system receives and understands this registration confirmation;
(18) log-on message that identity authorization system unloading is corresponding is to official register table;
(19) return and succeed in registration.
After being registered by above-mentioned register method, namely the smart machine used becomes trusted smart machine, improves the fail safe of smart machine.If user has changed smart machine, and does not notify manager, even if so user has installed APP, certification also cannot have been passed through.If user lost smart machine, the people finding smart machine also because of the password not logging in APP, and can cannot open APP, thus ensure that information and the property safety of user.
According to above-described embodiment, just the present invention can be realized well.What deserves to be explained is; under prerequisite based on said structure design, for solving same technical problem, even if some making on the invention are without substantial change or polishing; the essence of the technical scheme adopted is still the same with the present invention, therefore it also should in protection scope of the present invention.
Claims (4)
1. smart machine becomes a method for trusted smart machine, it is characterized in that, comprises the following steps:
(1) download, APP is installed, and generate installation identification code and set-up time;
(2) use installation identification code to encrypt set-up time formation TRC, or the hardware information formation TRC that identification code encrypts smart machine is installed in use;
(3) in configuration file TRC being kept at APP or Keystore;
(4) when starting APP, hardware information need be read or identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration;
Wherein, TRC is the packets of information of the encryption containing facility information and hardware information; OTA includes: the authority information of facility information, user profile and correspondence.
2. a kind of smart machine according to claim 1 becomes the method for trusted smart machine, it is characterized in that, when described smart machine is Android version, adopts following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) APP reads mainboard, CPU, the memory information of smart machine;
(3) use installation identification code encryption hardware information formation TRC, if cannot read hardware information, just practical identification code of installing encrypts set-up time formation TRC;
(4) in configuration file TRC being kept at APP or Keystore;
(5) when starting APP, all need to read hardware information;
(6) the QR code of scanning input registration, and input logs in the password of APP;
(7) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(8) smart machine encryption submits to log-on message to identity authorization system;
(9) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(10) smart machine checks private key and preserves private key;
(11) private key is used to generate the OTA confirming registration;
(12) confirmation registration request is sent to identity authorization system by smart machine;
(13) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
3. a kind of smart machine according to claim 1 becomes the method for trusted smart machine, it is characterized in that, when described smart machine is ISO version, adopts following steps:
(1) download, APP is installed, and generate installation unique identifier and set-up time;
(2) the installation identification code encryption set-up time is used to form TRC;
(3) TRC is kept in Keystore;
(4) when starting APP, all needing to read and identification code is installed;
(5) the QR code of scanning input registration, and input logs in the password of APP;
(6) smart machine reads checking QR code, and uses installation identification code to unlock TRC;
(7) smart machine encryption submits to log-on message to identity authorization system;
(8) identity authorization system encryption forms private key, and the private key that prestores, send private key to smart machine simultaneously;
(9) smart machine checks private key and preserves private key;
(10) private key is used to generate the OTA confirming registration;
(11) confirmation registration request is sent to identity authorization system by smart machine;
(12) identity authorization system receives and understands this registration confirmation, and log-on message corresponding to unloading is in official register table, namely succeeds in registration.
4. a kind of smart machine according to any one of claims 1 to 3 becomes the method for trusted smart machine, it is characterized in that, described smart machine is mobile phone or pad.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510103782.6A CN104767730A (en) | 2015-03-10 | 2015-03-10 | Method for changing intelligent device into credible intelligent device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510103782.6A CN104767730A (en) | 2015-03-10 | 2015-03-10 | Method for changing intelligent device into credible intelligent device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104767730A true CN104767730A (en) | 2015-07-08 |
Family
ID=53649339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510103782.6A Pending CN104767730A (en) | 2015-03-10 | 2015-03-10 | Method for changing intelligent device into credible intelligent device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104767730A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320391A (en) * | 2017-01-18 | 2018-07-24 | 芜湖美的厨卫电器制造有限公司 | Unlocking method, system and its equipment of leased equipment |
CN111131362A (en) * | 2018-11-01 | 2020-05-08 | 昆盈企业股份有限公司 | Method for sharing configuration file |
CN115037451A (en) * | 2021-11-19 | 2022-09-09 | 荣耀终端有限公司 | Data protection method and electronic equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661545A (en) * | 2009-09-22 | 2010-03-03 | 江汉大学 | Anti-pirate method and device for software capable of unloading and reinstalling |
US20140112551A1 (en) * | 2012-10-18 | 2014-04-24 | Dell Products L.P. | Secondary information for an information handling system matrix bar code function |
CN104270338A (en) * | 2014-09-01 | 2015-01-07 | 刘文印 | A method and system of electronic identity registration and authentication login |
-
2015
- 2015-03-10 CN CN201510103782.6A patent/CN104767730A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101661545A (en) * | 2009-09-22 | 2010-03-03 | 江汉大学 | Anti-pirate method and device for software capable of unloading and reinstalling |
US20140112551A1 (en) * | 2012-10-18 | 2014-04-24 | Dell Products L.P. | Secondary information for an information handling system matrix bar code function |
CN104270338A (en) * | 2014-09-01 | 2015-01-07 | 刘文印 | A method and system of electronic identity registration and authentication login |
Non-Patent Citations (1)
Title |
---|
李琛: "《一种基于两层在线身份认证的安全框架体系设计与实现》", 《一种基于两层在线身份认证的安全框架体系设计与实现》 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108320391A (en) * | 2017-01-18 | 2018-07-24 | 芜湖美的厨卫电器制造有限公司 | Unlocking method, system and its equipment of leased equipment |
CN108320391B (en) * | 2017-01-18 | 2021-03-09 | 芜湖美的厨卫电器制造有限公司 | Unlocking method and system of rental equipment and equipment thereof |
CN111131362A (en) * | 2018-11-01 | 2020-05-08 | 昆盈企业股份有限公司 | Method for sharing configuration file |
CN115037451A (en) * | 2021-11-19 | 2022-09-09 | 荣耀终端有限公司 | Data protection method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1913427B (en) | System and method for encrypted smart card PIN entry | |
KR20200138108A (en) | Apparatus and method for authenticating | |
CN110365484B (en) | Data processing method, device and system for equipment authentication | |
CN111783068B (en) | Device authentication method, system, electronic device and storage medium | |
US20130145166A1 (en) | System and method for data authentication among processors | |
CN110995710B (en) | Smart home authentication method based on eUICC | |
KR20120037380A (en) | Method for registering a mobile radio in a mobile radio network | |
CN107733636B (en) | Authentication method and authentication system | |
JP2012530311A5 (en) | ||
CN101742499A (en) | Account number protection system for mobile communication equipment terminal and application method thereof | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN105827573A (en) | System and method for strong authentication of internet of things equipment and related devices | |
CN105656862A (en) | Authentication method and device | |
CN108768941B (en) | Method and device for remotely unlocking safety equipment | |
CN104700479A (en) | Door control method based on out-of-band authentication | |
CN104767730A (en) | Method for changing intelligent device into credible intelligent device | |
US10476680B2 (en) | Electronic device with self-protection and anti-cloning capabilities and related method | |
CN109639418A (en) | Configuration information authentication method and device and rental car | |
EP3997851B1 (en) | Method, first device, first server, second server and system for accessing a private key | |
EP2985712B1 (en) | Application encryption processing method, apparatus, and terminal | |
US10984080B2 (en) | Method for authenticating a user and a secure module, associated electronic apparatus and system | |
CN107493572B (en) | Wireless radio frequency equipment, authentication server and authentication method | |
CN107426724B (en) | Method and system for accessing intelligent household electrical appliance to wireless network, terminal and authentication server | |
KR20030001721A (en) | System and method for certificating a smart card over network | |
CN111343133B (en) | Authentication method, authentication equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
EXSB | Decision made by sipo to initiate substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160608 Address after: 200000, Room 305, 1501-6 Ying Ying Road, Shanghai, Zhabei District Applicant after: Shanghai Financial Cloud Service Group Security Technology Co., Ltd. Address before: 610000, No. 1, North 78, purple North Street, Chengdu hi tech Zone, Sichuan, 2 Applicant before: Sichuan Ningchao Technology Co., Ltd. |
|
AD01 | Patent right deemed abandoned | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20181019 |