CN105072087A - Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things - Google Patents

Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things Download PDF

Info

Publication number
CN105072087A
CN105072087A CN201510396453.5A CN201510396453A CN105072087A CN 105072087 A CN105072087 A CN 105072087A CN 201510396453 A CN201510396453 A CN 201510396453A CN 105072087 A CN105072087 A CN 105072087A
Authority
CN
China
Prior art keywords
server
login
access
client
quick response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201510396453.5A
Other languages
Chinese (zh)
Inventor
谢海亭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Rui Hong Mdt Info Tech Ltd
Original Assignee
Anhui Rui Hong Mdt Info Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Rui Hong Mdt Info Tech Ltd filed Critical Anhui Rui Hong Mdt Info Tech Ltd
Priority to CN201510396453.5A priority Critical patent/CN105072087A/en
Publication of CN105072087A publication Critical patent/CN105072087A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to an access authentication method based on two-dimension codes and asymmetric encryption in an agricultural material Internet-of-Things. The method includes the following steps: a, a server generating a log-in session sequence on the basis of log-in connection information of an access client; b, the access client displaying a log-in two-dimension code returned by an output server; c, using a mobile terminal to scan the log-in two-dimension code on the access client, analyzing the log-in two-dimension code, and selecting an account by the mobile terminal when a server name and a server identifier match server information inside the mobile terminal; d, logging in through the mobile terminal after account selection, and an identifier mobile terminal transmitting log-in confirmation information associated with the selected account to the server; and e, the server transmitting log-in success information to the access client if the deciphered log-in session sequence matches a session sequence in the server. The method is convenient to operate, and the security of access authentication of an agricultural material Internet-of-Things is improved.

Description

Based on the access authentication method of Quick Response Code and asymmetric encryption in means of agricultural production Internet of Things
Technical field
The present invention relates to a kind of access authentication method, based on the access authentication method of Quick Response Code and asymmetric encryption in especially a kind of means of agricultural production Internet of Things, belong to the technical field of means of agricultural production Internet of Things.
Background technology
Agricultural is source, the existence basis of mankind's basic necessities of life, is the most important condition that all are produced.The safety of agricultural material product is to ensureing that the safety of agricultural production has the effect of particular importance.Under the overall background of Internet of Things development instantly, the appearance of means of agricultural production Internet of Things is necessary.
Although the Internet has penetrated into the every aspect of people's live and work, also brought increasing safety problem simultaneously.People have the account of different web sites, and protect the typical way of these accounts to be passwords.Password has more long more complicated inherent characteristics, and let us is at safety and dilemma of being expediently compelled to do always.
The password of a typical web site, may go wrong in the following aspects and cause leaking:
1), weak passwurd is directly exhaustive;
2), user password is stolen by the wooden horse in computer, as Internet bar or notebook itself have been mounted wooden horse;
3), man-in-the-middle attack eavesdropping user password;
4), fishing website deceive users logs in thus obtains the user name and password;
5), hack server obtain backstage store clear-text passwords or staff defalcate.
With regard to by means of agricultural production Internet of Things, once password is cracked by above-mentioned any one mode, and user often uses identical password between multiple account, so many times once crack and can cause chain reaction, user probably suffers heavy losses.Although industry is the safety of password make unremitting effort, as technology such as dynamic password card, two-factor authentication, OpenID and OAUTH certifications, but safety and easily dilemma still exist: password is easily stolen simply again, password complexity is then not easy to remember inconvenient practicality.Along with the development in an all-round way of cloud computing, the Internet, Internet of Things, social networks and open platform, password question shows more and more serious.
Summary of the invention
The object of the invention is to overcome the deficiencies in the prior art, provide the access authentication method based on Quick Response Code and asymmetric encryption in a kind of means of agricultural production Internet of Things, it is easy to operate, improves the fail safe of the access registrar of means of agricultural production Internet of Things.
According to technical scheme provided by the invention, based on the access authentication method of Quick Response Code and asymmetric encryption in a kind of means of agricultural production Internet of Things, comprise server and mobile client and the access client of communication can be carried out with described server; Described access authentication method comprises the steps:
A, utilize access client to open the login interface of logon server, to connect server, server generates login sessions sequence according to the login link information of access client;
B, server return login Quick Response Code according to generation session sequence to access client, the URL address that the information that described login Quick Response Code comprises comprises login sessions sequence, server name, identifier server, login confirmation will be submitted to; Whether the login Quick Response Code that access client display translation server returns, and continuous training in rotation access services device, complete login to detect;
C, the login Quick Response Code used in mobile client scanning access client, and described login Quick Response Code is resolved, to obtain server name, identifier server that place login sessions sequence pair is answered; Server name obtained above, identifier server are mated with the server info in mobile client, and when utilizing server name, identifier server to mate with the server info in mobile client, mobile client selects account number, signs in the server of coupling to utilize described selection account number;
D, after selected account number, utilize mobile client to log in, the login confirmation relevant to selected account number transfers in server by mobile client; Described login confirmation comprises account name and uses the login sessions sequence of user RSA encrypted private key;
E, server receive the login confirmation of mobile client submission and resolve the identity information relevant to account number of transmission; Server searches the user RSA PKI corresponding with described account name according to resolving the account name obtained, and utilizes user RSA PKI to be decrypted utilizing the login sessions sequence of user RSA encrypted private key; When the login sessions sequence after deciphering and the session sequences match in server, server logins successfully information to access client transmission.
In described steps d, log in confirmation and use user RSA private key to carry out rsa encryption to login sessions sequence.
Described mobile client comprises smart mobile phone.
In described step e, the PKI preserved when user RSA PKI is registration in server.
Registration obtains user RSA PKI and comprises the steps: in the server
S1, utilize access client to open the register interface of connection server, server generates enrollment session sequence according to the connection log-on message of access client;
S2, utilize access client to submit to server in register interface to comprise the log-on message of account name;
S3, server return registration Quick Response Code according to the log-on message received to access client, and the information of described registration Quick Response Code comprises the URL address that enrollment session sequence, server name, identifier server, account name and registration confirmation will be submitted to; Whether the registration Quick Response Code that access client display translation server returns, and continuous training in rotation access services device, complete registration to detect;
S4, the registration Quick Response Code used in mobile client scanning access client, and registration Quick Response Code is resolved, to obtain server name, identifier server that place login sessions sequence pair is answered; In mobile client, utilize rsa encryption method stochastic generation user RSA public, private key pair, described user RSA public, private key is to comprising user RSA PKI and user RSA private key; In mobile client by account name, server name, identifier server and user RSA public, private key to carrying out association store;
S5, mobile client are after carrying out above-mentioned association store, and submit registration confirmation to server, described registration confirmation comprises account name, user RSA PKI and enrollment session sequence;
S6, server receive the registration confirmation of mobile client submission and resolve described registration confirmation, to obtain account name, user RSA PKI and the enrollment session sequence registered; The account name of parsing and account name to be registered are compared by server, and after the account name of resolving mates with account name to be registered, account name and user RSA PKI are carried out association store by server, and transmit to access client the information that succeeds in registration.
Described mobile client submits to the mode of registration confirmation to comprise GPRS, 3G network to server.
Advantage of the present invention: in whole login process, owing to there is not password, and RSA key has high strength safe, so the method for exhaustion cannot obtain user profile; User RSA PKI and user RSA private key, to not deriving mutually, also cannot be used even if hacker or server internal employee obtain server-side user database; Certification only completes in mobile client and server, even if access client is by extension horse, the safety of user account also cannot be broken; The private key of both sides does not transmit on network, so man-in-the-middle attack is invalid; User identity does not transmit when logging in, so the account name that phishing attack is even used in conjunction family all cannot obtain, easy to operate, improves the fail safe of the access registrar of means of agricultural production Internet of Things.
Accompanying drawing explanation
Fig. 1 is the schematic diagram that the present invention carries out logging in.
Fig. 2 is the schematic diagram that the present invention carries out registering.
Description of reference numerals: 100-server, 110-mobile client and 120-access client.
Embodiment
Below in conjunction with concrete drawings and Examples, the invention will be further described.
As shown in Figure 1: in order to improve the reliability of message reference certification in Internet of Things, the present invention includes server 100 and the mobile client 110 of communication and access client 120 can be carried out with described server 100; Described access authentication method comprises the steps:
A, utilize access client 120 to open the login interface of logon server 100, to connect server 100, server 100 generates login sessions sequence according to the login link information of access client 120;
In the embodiment of the present invention, access client 120 generally can for carrying out the computer of network connection to server 100, mobile client 110 can comprise smart mobile phone, also can be other hand-held intelligent equipment.The login sessions sequence that server 100 generates is the identifier generated for current login link information.
B, server 100 return login Quick Response Code according to generation session sequence to access client 120, the URL address that the information that described login Quick Response Code comprises comprises login sessions sequence, server name, identifier server, login confirmation will be submitted to; Whether the login Quick Response Code that access client 120 display translation server 100 returns, and continuous training in rotation access services device 100, complete login to detect;
Quick Response Code is according to certain rules in the chequered with black and white graphic recording data symbol information of the upper distribution of plane (two-dimensional directional) with certain specific geometric figure, except having, information capacity is large for it, except reliability high feature, also have ultrahigh speed to distinguish comprehensive recognition can represent Chinese character image sound etc. all can digitized information, and have the advantages such as very strong security and antiforge purpose.As a kind of new information carrier, Quick Response Code has now been widely used in the fields such as national defence, public safety, communications and transportation, health care, industry, business, finance, customs and government.In the embodiment of the present invention, log in Quick Response Code and can adopt QR code, described QR code is the one of two-dimensional bar code.Compared with other Quick Response Codes, QR code has that recognition speed is fast, packing density is large, take up room little advantage.Identifier server is the unique identifier of identification server, by logging in the confirmation URL(UniformResoureLocator that will submit to) address can facilitate mobile client 110 to log in the submission of confirmation.Above-mentioned continuous training in rotation access services device 100 refer to access client 120 constantly and server 100 carry out communication, to have determined whether login.
C, use mobile client 110 scan the login Quick Response Code in access client 120, and resolve described login Quick Response Code, to obtain server name, identifier server that place login sessions sequence pair is answered; Server name obtained above, identifier server are mated with the server info in mobile client 110, and when utilizing server name, identifier server to mate with the server info in mobile client 110, mobile client 110 selects account number, signs in the server of coupling to utilize described selection account number;
In the specific implementation, submitted to by mobile client 110 and log in confirmation, in mobile client 110, comprise the information that server 100 needs log in.When logging in, server database is stored in mobile client 110, comprise server 100 information needing sign-on access in a large number in described server database, the server info searched needed for coupling can be carried out by the server name of server 100, identifier server in server database.When utilizing server name, identifier server to mate with the server info in mobile client 110, illustrating and needing to have passed through certification between the server 110 of login and mobile client 110, follow-up login can be realized and confirm operation.When utilizing server name, identifier server can not mate with the server info in mobile client 110, then mobile client 110 can stop this register.
D, after selected account number, utilize mobile client 110 to log in, the login confirmation relevant to selected account number transfers in server 100 by mobile client 110; Described login confirmation comprises account name and uses the login sessions sequence of user RSA encrypted private key;
Rivest, shamir, adelman needs two keys: public-key cryptography (publickey) and private cipher key (privatekey).Public-key cryptography and private cipher key are a pair, if be encrypted data with public-key cryptography, only had and could decipher with corresponding private cipher key; If be encrypted data with private cipher key, so only had and could decipher with corresponding public-key cryptography.
The feature of asymmetric cryptosystem is that algorithm intensity is complicated, fail safe depends on algorithm and key.So ensure that its fail safe is exactly the safety ensureing key, and Asymmetric encryption has two kinds of keys, and one of them so just can not need the key transmitting the other side as symmetric cryptography disclosed in being, therefore fail safe is just large a lot.RSA Algorithm is one of the most influential current rivest, shamir, adelman.
The algorithm of RSA relates to three parameters: n, e1, e2.
N is the long-pending of two large prime number p, q, and figure place shared during the binary representation of n is exactly so-called key length.E1 and e2 is a pair relevant value, and e1 can get arbitrarily, but requires that e1 and (p-1) * (q-1) are relatively prime; Select e2 again, require (e2*e1) mod ((p-1) * (q-1))=1.(n, e1), (n, e2) is exactly double secret key.Wherein (n, e1) is PKI, and (n, e2) is private key.
The algorithm of RSA encryption and decryption is identical, if A is that expressly B is ciphertext, then: A=B^e2modn; B=A^e1modn; (in public encryption system, generally use public key encryption, private key is deciphered), e1 and e2 can exchange use, that is: A=B^e1modn; B=A^e2modn.
Logging in confirmation uses user RSA private key to carry out rsa encryption to login sessions sequence.In the embodiment of the present invention, utilize user RSA private key to carry out rsa encryption to login sessions sequence as described above, be specially known by those skilled in the art of the present technique, no longer know herein.User RSA private key in mobile client 110 can by obtaining in verification process between mobile client 110 and server 100, specifically can with reference to following registration step.
E, server 100 receive the login confirmation of mobile client 110 submission and resolve the identity information relevant to account number of transmission; Server 100 searches the user RSA PKI corresponding with described account name according to resolving the account name obtained, and utilizes user RSA PKI to be decrypted utilizing the login sessions sequence of user RSA encrypted private key; When the login sessions sequence after deciphering and the session sequences match in server 100, server 100 logins successfully information to access client 120 transmission.
The PKI preserved when user RSA PKI is registration in server 100.
In server 100, registration obtains user RSA PKI and comprises the steps:
S1, utilize access client 120 to open the register interface of connection server 100, server 100 generates enrollment session sequence according to the connection log-on message of access client 120;
S2, utilize access client 120 to submit to server 100 in register interface to comprise the log-on message of account name;
S3, server 100 return registration Quick Response Code according to the log-on message received to access client 120, and the information of described registration Quick Response Code comprises the URL address that enrollment session sequence, server name, identifier server, account name and registration confirmation will be submitted to; Whether the registration Quick Response Code that access client 120 display translation server 100 returns, and continuous training in rotation access services device 100, complete registration to detect;
S4, use mobile client 110 scan the registration Quick Response Code in access client 120, and resolve registration Quick Response Code, to obtain server name, identifier server that place login sessions sequence pair is answered; In mobile client 110, utilize rsa encryption method stochastic generation user RSA public, private key pair, described user RSA public, private key is to comprising user RSA PKI and user RSA private key; In mobile client 110 by account name, server name, identifier server and user RSA public, private key to carrying out association store, and when carrying out association store the information of interpolation just registered user.
S5, mobile client 110, after carrying out above-mentioned association store, submit registration confirmation to server 100, and described registration confirmation comprises account name, user RSA PKI and enrollment session sequence;
S6, server 100 receive the registration confirmation of mobile client 110 submission and resolve described registration confirmation, to obtain account name, user RSA PKI and the enrollment session sequence registered; The account name of parsing and account name to be registered are compared by server 100, after the account name of resolving mates with account name to be registered, account name and user RSA PKI are carried out association store by server 100, and transmit to access client 120 information that succeeds in registration.
Described mobile client 110 submits to the mode of registration confirmation to comprise GPRS, 3G network to server 100.In addition, mobile client 110 submits to login confirmation mode identical with the mode of above-mentioned submission registration confirmation to server 100, when specifically implementing, can also adopt other network types of attachment.
Further, the problem that the content itself for mobile client 110 li is easily stolen, can carry out level of security lifting to mobile client 110, and as required, user just can only can open account management application by password; Require that when performing register user inputs a simple password or provides fingerprint etc.Information security in a word in control mobile client 110 is than directly information being exposed in the Internet much easier.
Secondly, once mobile client 110 is stolen may cause the problem of information dropout, the data in mobile client 110 should be able to be encrypted and back up, and user can import original accounts information in the new mobile client 110 of use.In addition, for very crucial user, for reducing risks, except the above-mentioned authentication mechanism mentioned is provided, also should additional query second password, perfectly safe to guarantee very crucial personal account.
The present invention is in whole login process, and owing to there is not password, and RSA key has high strength safe, so the method for exhaustion cannot obtain user profile; User RSA PKI and user RSA private key, to not deriving mutually, also cannot be used even if hacker or server internal employee obtain server-side user database; Certification only completes in mobile client 110 and server 100, even if access client 120 is by extension horse, the safety of user account also cannot be broken; The private key of both sides does not transmit on network, so man-in-the-middle attack is invalid; User identity does not transmit when logging in, so the account name that phishing attack is even used in conjunction family all cannot obtain, easy to operate, improves the fail safe of the access registrar of means of agricultural production Internet of Things.

Claims (6)

1. in means of agricultural production Internet of Things based on an access authentication method for Quick Response Code and asymmetric encryption, it is characterized in that, comprise server (100) and the mobile client (110) of communication and access client (120) can be carried out with described server (100); Described access authentication method comprises the steps:
(a), utilize access client (120) to open the login interface of logon server (100), to connect server (100), server (100) generates login sessions sequence according to the login link information of access client (120);
B (), server (100) return login Quick Response Code according to generation session sequence to access client (120), the URL address that the information that described login Quick Response Code comprises comprises login sessions sequence, server name, identifier server, login confirmation will be submitted to; Whether the login Quick Response Code that access client (120) display translation server (100) returns, and continuous training in rotation access services device (100), complete login to detect;
(c), the login Quick Response Code used in mobile client (110) scanning access client (120), and described login Quick Response Code is resolved, to obtain server name, identifier server that place login sessions sequence pair is answered; Server name obtained above, identifier server are mated with the server info in mobile client (110), and when utilizing server name, identifier server to mate with the server info in mobile client (110), mobile client (110) selects account number, signs in the server of coupling to utilize described selection account number;
(d), after selected account number, utilize mobile client (110) to log in, the login confirmation relevant to selected account number transfers in server (100) by mobile client (110); Described login confirmation comprises account name and uses the login sessions sequence of user RSA encrypted private key;
E (), server (100) receive login confirmation that mobile client (110) submits to and resolve the identity information relevant to account number of transmission; Server (100) searches the user RSA PKI corresponding with described account name according to resolving the account name obtained, and utilizes user RSA PKI to be decrypted utilizing the login sessions sequence of user RSA encrypted private key; When the login sessions sequence after deciphering and the session sequences match in server (100), server (100) logins successfully information to access client (120) transmission.
2. in means of agricultural production Internet of Things according to claim 1 based on the access authentication method of Quick Response Code and asymmetric encryption, it is characterized in that: in described step (d), log in confirmation and use user RSA private key to carry out rsa encryption to login sessions sequence.
3. in means of agricultural production Internet of Things according to claim 1 based on the access authentication method of Quick Response Code and asymmetric encryption, it is characterized in that: described mobile client (110) comprises smart mobile phone.
4. in means of agricultural production Internet of Things according to claim 1 based on the access authentication method of Quick Response Code and asymmetric encryption, it is characterized in that: in described step (e), the PKI preserved when user RSA PKI is registration in server (100).
5. in means of agricultural production Internet of Things according to claim 4 based on the access authentication method of Quick Response Code and asymmetric encryption, it is characterized in that: in server (100), registration obtains user RSA PKI and comprises the steps:
(S1), utilize access client (120) to open the register interface of connection server (100), server (100) generates enrollment session sequence according to the connection log-on message of access client (120);
(S2), utilize access client (120) in register interface, submit the log-on message comprising account name to server (100);
(S3), server (100) returns registration Quick Response Code according to the log-on message received to access client (120), and the information of described registration Quick Response Code comprises the URL address that enrollment session sequence, server name, identifier server, account name and registration confirmation will be submitted to; Whether the registration Quick Response Code that access client (120) display translation server (100) returns, and continuous training in rotation access services device (100), complete registration to detect;
(S4), the registration Quick Response Code used in mobile client (110) scanning access client (120), and registration Quick Response Code to be resolved, to obtain server name, identifier server that place login sessions sequence pair is answered; In mobile client (110), utilize rsa encryption method stochastic generation user RSA public, private key pair, described user RSA public, private key is to comprising user RSA PKI and user RSA private key; In mobile client (110) by account name, server name, identifier server and user RSA public, private key to carrying out association store;
(S5), mobile client (110) after carrying out above-mentioned association store, to server (100) submit to registration confirmation, described registration confirmation comprises account name, user RSA PKI and enrollment session sequence;
(S6), server (100) receives mobile client (110) registration confirmation submitted to and resolves described registration confirmation, to obtain account name, user RSA PKI and the enrollment session sequence registered; The account name of parsing and account name to be registered are compared by server (100), after the account name of resolving mates with account name to be registered, account name and user RSA PKI are carried out association store by server (100), and transmit to access client (120) information that succeeds in registration.
6. in means of agricultural production Internet of Things according to claim 5 based on the access authentication method of Quick Response Code and asymmetric encryption, it is characterized in that: described mobile client (110) submits to the mode of registration confirmation to comprise GPRS, 3G network to server (100).
CN201510396453.5A 2015-07-08 2015-07-08 Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things Withdrawn CN105072087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510396453.5A CN105072087A (en) 2015-07-08 2015-07-08 Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510396453.5A CN105072087A (en) 2015-07-08 2015-07-08 Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things

Publications (1)

Publication Number Publication Date
CN105072087A true CN105072087A (en) 2015-11-18

Family

ID=54501372

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510396453.5A Withdrawn CN105072087A (en) 2015-07-08 2015-07-08 Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things

Country Status (1)

Country Link
CN (1) CN105072087A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493006A (en) * 2019-08-28 2019-11-22 如般量子科技有限公司 Anti- quantum calculation two dimensional code authentication method and system based on unsymmetrical key pond and sequence number
CN114422233A (en) * 2022-01-17 2022-04-29 中国科学院软件研究所 Login method and system for private equipment
CN115065559A (en) * 2022-08-15 2022-09-16 浙江毫微米科技有限公司 Identity authentication system, method and device, electronic equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110493006A (en) * 2019-08-28 2019-11-22 如般量子科技有限公司 Anti- quantum calculation two dimensional code authentication method and system based on unsymmetrical key pond and sequence number
CN110493006B (en) * 2019-08-28 2021-10-22 如般量子科技有限公司 Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and serial number
CN114422233A (en) * 2022-01-17 2022-04-29 中国科学院软件研究所 Login method and system for private equipment
CN114422233B (en) * 2022-01-17 2023-01-13 中国科学院软件研究所 Login method and system for private equipment
CN115065559A (en) * 2022-08-15 2022-09-16 浙江毫微米科技有限公司 Identity authentication system, method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
TWI683567B (en) Security verification method, device, server and terminal
KR102493744B1 (en) Security Verification Method Based on Biometric Characteristics, Client Terminal, and Server
US10530582B2 (en) Method and device for information system access authentication
US8776176B2 (en) Multi-factor password-authenticated key exchange
Jangirala et al. A multi-server environment with secure and efficient remote user authentication scheme based on dynamic ID using smart cards
US10320564B2 (en) System and method for generating and depositing keys for multi-point authentication
US8661254B1 (en) Authentication of a client using a mobile device and an optical link
CN102684877B (en) A kind of method and device carrying out user profile process
Amin et al. A Two‐Factor RSA‐Based Robust Authentication System for Multiserver Environments
US20170085561A1 (en) Key storage device and method for using same
CN101815091A (en) Cipher providing equipment, cipher authentication system and cipher authentication method
CN109618326A (en) User's dynamic identifier generation method and service registration method, login validation method
Xiao et al. A lightweight authentication scheme for telecare medical information system
WO2013117019A1 (en) Method and device for system login based on dynamic password generated autonomously by user
CN103873477A (en) Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet of Things
Deverajan et al. Public key encryption with equality test for Industrial Internet of Things system in cloud computing
CN102780698A (en) User terminal safety communication method in platform of Internet of Things
CN102123166B (en) Equipment and method for accessing target network application on the basis of instant messaging client
CN103269328A (en) Authentication system based on graphic information exchange and method thereof
CN105187382A (en) Multi-factor identity authentication method for preventing library collision attacks
CN106059764A (en) Password and fingerprint third-party authentication method based on halting key derivation function
CN105072087A (en) Access authentication method based on two-dimension code and asymmetric encryption in agricultural material Internet-of-Things
CN103546292A (en) Third-party certification system or method with multiple identification codes
CN105978688B (en) A kind of cross-domain safety certifying method based on information separation management
Nadeem et al. Two layer symmetric cryptography algorithm for protecting data from attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20151118