CN105282148A - Data remote authentication system and method - Google Patents
Data remote authentication system and method Download PDFInfo
- Publication number
- CN105282148A CN105282148A CN201510590686.9A CN201510590686A CN105282148A CN 105282148 A CN105282148 A CN 105282148A CN 201510590686 A CN201510590686 A CN 201510590686A CN 105282148 A CN105282148 A CN 105282148A
- Authority
- CN
- China
- Prior art keywords
- authentication
- module
- code
- authorization code
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 238000013475 authorization Methods 0.000 claims abstract description 96
- 238000004891 communication Methods 0.000 claims abstract description 21
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 1
- 238000002716 delivery method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a data remote authentication system and method, aiming to solve the technical problem of inconvenient data remote authentication. The data remote authentication system is provided with a code sending module and an authentication module. The data remote authentication system includes the following steps that an authorizer sends an encrypted authorization code to a user's transceiver on a code sending device, a user sends the encrypted authorization code to an authentication device for discrimination, the authentication device determines the operation starting and ending time, effective operation time period, validity and effectiveness of operation frequencies, and the authentication device sends a releasing instruction to an execution module or a circuit. Compared with the prior art, the authorizer encrypts the authorization code including various types of information, and then transmits the encrypted authorization code to a user's smart phone, the user uses the received encrypted authorization code to visit the authentication device through the combination with a wireless communication means, so that a series of problems of data transmission, data protection, remote authentication of remote authorization and authorization cancel are solved, and the remote authorization is realized.
Description
Technical Field
The present invention relates to a remote control system and method, and more particularly, to a remote authentication system and method for requesting data.
Background
Authentication refers to verifying whether a user has the right to access a visited system. The application scenarios of authentication are very wide, such as: computer account login and access control. The common authentication methods include password authentication, key authentication, Radio Frequency Identification (RFID) authentication and biometric authentication. The biometric authentication is specific to a specially assigned person and is not in the scope of remote authorization. Such as: theoretically you cannot lend your fingerprint to others for use, so it is not possible to authorize others to use your fingerprint to access the access control system.
The authentication mode comparison in the prior art:
wherein,
1) the password authentication is that when a user is established, a password needs to be allocated to the user, and the password of the user can be designated by an administrator or can be applied by the user. The password is simple and convenient to send and use, but the weakness of the method is obvious: once the password is stolen or lost, the situation is very troublesome, an administrator needs to modify the password of the user again, and before the password is modified, the legal identity of the user is often verified manually. Similarly, if time and frequency control is added to the password, administrator intervention is also required. Such a mode of operation is relatively inefficient and relatively costly to maintain.
2) Key verification, which is the main authentication method adopted by the current access control system. The authorization of the authentication system usually adopts an original key management method, and an authorizer gives a key to a user in a face-to-face mode, the user operates on corresponding authentication equipment such as an entrance guard, and the key is returned to the authorizer after the use is finished. The face-to-face authorization method has the defects that sometimes authorizers such as a key manager, a user and equipment to be authenticated are far away from each other, the face-to-face key delivery mode is low in efficiency, the risk that the key is copied exists, and the efficiency cannot be improved even if the modern logistics express delivery method is adopted.
3) The integrated circuit IC card is used as an improvement of the traditional mechanical key and replaces the traditional mechanical key with the integrated circuit IC card. However, this method only solves the problem of preventing the key from being copied, and fails to solve the problem of the efficiency of authorized issuing.
Therefore, the prior art has no ideal technical solution for solving the remote authentication.
Disclosure of Invention
The invention aims to provide a system and a method for remote authentication of data, and aims to solve the technical problem of facilitating remote authentication of data.
The invention adopts the following technical scheme that the remote authentication system for data is provided with a code sending module and an authentication module;
the code sending module receives access permission of operating the authentication equipment and requested data, converts the access permission into an authorization code, encrypts the authorization code again to form an encrypted authorization code, and sends the encrypted authorization code to the authentication module through the electronic text;
the authentication module receives the encryption authorization code sent by the code sending module, identifies the validity of the encryption authorization code and sends a release instruction to the execution module or the circuit.
A receiving and sending module is arranged between the code sending module and the authentication module and used for receiving the encryption authorization code sent by the code sending module and forwarding the encryption authorization code to the authentication module.
The number of the transceiver modules of the present invention is not more than 10000.
The code sending module of the invention forwards the encryption authorization code to the authentication module through any transceiver module, or the transceiver module forwards the encryption authorization code to the authentication module one by one.
The electronic text of the invention is short message, information push of mobile equipment application, instant chat tool or e-mail; the transceiver module forwards the encrypted authorization code to the authentication module, and forwards the encrypted authorization code according to a short-distance wireless communication Bluetooth, WiFi, ZigBee protocol or an optical mode.
The requested data of the invention is more than one of the ID of the transceiver module, the ID of the requested task, the access timestamp, the ID of the authentication equipment allowing operation, the start-stop time of the operation, the effective operation time period and the operation times.
The encrypted keys of the invention are respectively pre-stored in the code sending module and the authentication module and are a group of 16-system numbers.
The code sending module receives access permission of the operation authentication equipment and data of other requests of additional information, converts the data into 32-byte hexadecimal coding authorization codes, and encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits; and whether the authentication encryption authorization code is valid or not is firstly decoded according to AES-128, and then the authentication module judges that the decoded data is legal or valid.
The authentication module of the invention judges that the decoded data is illegal or invalid and makes a monitoring log.
The invention discloses a remote authentication method of data, which comprises the following steps:
firstly, after receiving an access requirement or a request of a user, an authorizer sends request data for authorizing the user to operate an authentication device on a code sending device, and the code sending device converts a 32-byte hexadecimal coding authorization code in a BCD coding format; the request is as follows: the system comprises a transceiver module ID, a request task ID, an access timestamp, an authentication device ID allowing operation, operation starting and stopping time, effective operation time period and operation times;
secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code; the encrypted keys are respectively pre-stored in code sending equipment and authentication equipment of an authorizer;
thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail;
after receiving the encrypted authorization code, the user calls the wireless communication equipment on the transceiver equipment and sends the encrypted authorization code to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment;
fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting a prestored AES-128 algorithm key, the authentication device verifies the decrypted request data, judges that the start-stop time, the effective operation time period and the operation times are legal and effective, and sends a release instruction to the execution module or the circuit; and judging whether the decoded data is illegal or invalid, and making a monitoring log.
Compared with the prior art, the invention has the advantages that an authorizer encrypts the authorization code containing various information, transmits the authorization code to the smart phone of the user by using a public communication network, and then the user accesses the authentication equipment by using the received encrypted authorization code by combining a wireless communication means, such as: the entrance guard solves a series of problems encountered by data transmission, data protection, remote authentication and authorization cancellation of remote authorization, thereby realizing remote authorization.
Drawings
FIG. 1 is a schematic diagram of the system architecture of the present invention.
FIG. 2 is a schematic diagram of an embodiment of the system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. As shown in fig. 1, the remote authentication system (system) for data of the present invention is provided with a code sending module, a transceiver module and an authentication module.
The code sending module receives data of access permission and other additional information requests of an authorized user for operating certain authentication equipment, converts the data into 32-byte hexadecimal coding authorization codes according to a custom data structure in a BCD coding format, encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits to form encrypted authorization codes, and sends the encrypted authorization codes to the receiving and sending module through a short message SMS, information push applied by mobile equipment, an instant chat tool IM or an Email, or any communication form of universal electronic text sending. The requested data is more than one of the transceiver module ID, the request task ID, the access time stamp, the authentication device ID allowing operation, the operation (access) start-stop time, the valid operation period and the operation times. The encrypted key is set by an authorized person and is respectively pre-stored in the code sending module and the authentication module and is a group of 16-system numbers.
The custom data structure is:
7 bytes | 2 bytes | 7 bytes | 1-byte | 10-byte | 4-byte | 1-byte |
Task ID | Lock number | Region coding | Number of times | Start and end time | Period of validity | Week |
The transceiver module receives the encryption authorization code sent by the code sending module and forwards the encryption authorization code to the authentication module according to the near field communication NFC, Bluetooth, WiFi, ZigBee protocol or optical mode. The transceiver module is mastered and used by a user, and is relatively easy to attack or decompile. However, the transceiver module does not decrypt the encrypted authorization code and is only responsible for forwarding to the authentication module, and the transceiver module does not store the encryption key, so that the AES-128 encryption key of the encrypted authorization code cannot be revealed in the link.
The authentication module receives the encrypted authorization code sent by the transceiver module, identifies whether the encrypted authorization code is valid or not, firstly decodes according to AES-128, then judges whether the decoded data is legal or valid, and finally sends a release instruction to the execution module or the circuit, for example, when the authentication device is an access control system, the authentication module sends an access control opening instruction to the electromagnetic device of the access control, the electromagnetic device is powered off and has no magnetic force after receiving the instruction, and the door is opened; and if the decoded data is judged to be illegal or invalid, making a monitoring log.
The code sending module is arranged on the code sending device, the code sending device is an intelligent terminal, and can be a mobile terminal device adopting an iOS system or an Android system, or any other intelligent terminal device, such as: the mobile phone operating system is a Windows Phone device, a blackberry or a handheld device of a customized system, a personal computer PC adopting a Windows system or a Linux system, or a server adopting a Windows system or a Linux system.
The receiving and sending module is arranged on receiving and sending equipment, and the receiving and sending equipment is Bluetooth communication equipment, Near Field Communication (NFC) equipment, wireless fidelity (WiFi) wireless communication equipment, ZigBee equipment or two-dimensional code generating equipment, such as a smart phone, a tablet computer or radio frequency receiving and sending equipment.
The authentication module is arranged on the authentication device, and the authentication device may be a fixed or mobile electronic device, or a terminal device of a cloud server, such as: the system comprises an access control device, a handheld POS machine, an automobile security system, a smart phone, a personal computer or a server of a security control center of a property company.
The code sending equipment and the receiving and sending equipment are connected through a public network, and the public network is a wireless communication network and the Internet. The transceiving equipment and the authentication equipment adopt Bluetooth, NFC, WiFi, ZigBee communication or optical communication.
As shown in FIG. 2, the number of the transceiver modules is 0-10000, and the transceiver modules are arranged on equipment capable of transceiving electronic texts. And after the code sending module sends the encryption authorization code, the encryption authorization code is transmitted to the authentication module through 0-10000 transceiver modules. The number of the transceiver modules can be specifically set according to the actual working scene or the needs of the system.
If the number of the receiving and sending modules is 0, namely the receiving and sending modules are not arranged, the code sending device is connected with the authentication device through a public network at the moment, the code sending module directly communicates with the authentication module to carry out direct authentication, and under the mode, the code sending module directly sends the encryption authorization code to the authentication module.
If the number of the transceiver modules is more than 1, the code sending module forwards the encrypted authorization code to the authentication module through any transceiver module, and when the system allows the transceiver modules to be anonymous, the encrypted authorization code received by each transceiver module is judged to be valid by the authentication module. Some systems with high requirements on security performance can specify that the encrypted authorization code received by one transceiver module can only be judged to be valid by the authentication module, and other transceiver modules cannot be judged to be valid by the authentication device even if the other transceiver modules receive the encrypted authorization code forwarded by the specified transceiver module or sent by the code sending module. In such a system, an authentication module needs to be added to determine the ID number ID of the transceiver module.
Or the encryption authorization code can be forwarded to the authentication module one by one according to a plurality of transceiver modules. For example: the number of the receiving and sending modules is 2, and the code sending module forwards the encryption authorization codes to the authentication module one by one through the two receiving and sending modules. The code sending module sends the encrypted authorization code to a transceiver module arranged on the mobile phone through a public network, the transceiver module sends the encrypted authorization code to the transceiver module arranged on the access control equipment through wireless communication after receiving the encrypted authorization code, and the transceiver module of the access control equipment forwards the encrypted authorization code to an authentication module of a server of a control center through a port or a module which is provided with the transceiver module and used for accessing the internet, such as: and the server of the security control center of the property company performs networking authentication, identifies whether the encrypted authorization code is valid or not, decodes according to AES-128 and judges whether the decoded data is valid or not. And if the password is legal or valid, forwarding a release instruction to the access control equipment through the network. After the entrance guard equipment receives the release instruction, the corresponding electromagnetic equipment is powered off immediately and has no magnetic force, and the door is opened.
The invention discloses a remote authentication method of data, which comprises the following steps:
firstly, after receiving the access requirement or request of a user, an authorizer sends request data for authorizing the user to operate certain authentication equipment on code sending equipment, and the code sending equipment converts a 32-byte hexadecimal coding authorization code in a BCD coding format according to a self-defined data structure. The request is as follows: the service provider may further include one or more of a transceiver module ID, a request task ID, an access time stamp, an authentication device ID allowing an operation, an operation (access) start-stop time, a valid operation period, and the number of operations.
And secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code. The encrypted key is set by the authorizer and is respectively stored in the code sending device and the authentication device of the authorizer in advance.
And thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail.
After receiving the encryption authorization code, the user calls the wireless communication equipment on the transceiver equipment, such as: bluetooth, NFC, WiFi, ZigBee or optical communication are sent to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment.
And fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting the prestored AES-128 algorithm key. The authentication device checks the decrypted request data and judges whether the current authentication device is allowed to be accessed, the access starting and stopping time, the effective operation time interval and the operation times are legal and effective. If the authentication equipment is valid, the authentication equipment sends a release instruction to the execution module or the circuit, if the authentication equipment is an access control system, the authentication module sends an access control opening instruction to the access control electromagnetic equipment, and the electromagnetic equipment is powered off and has no magnetic force after receiving the instruction, the door is opened; and if the decoded data is judged to be illegal or invalid, making a monitoring log.
The invention discloses a method for authenticating access request data sent by an authorizer to a remote user by remote equipment under the condition of ensuring that the access request data is not tampered and cracked. The system can be popularized to self-service hotels, equipment patrol maintenance, article storage and transportation, equipment sharing use and access control management.
In this embodiment, the code sending device adopts a hua che 7 mobile phone, the transceiver device adopts an LGNEXUS5 mobile phone, the authentication device adopts an IUIVS105 door lock of shenzhen limited technologies, the code sending device is connected with the transceiver device through a mobile communication network, sends and receives the encrypted authorization code through a short message, and the transceiver device is connected with the authentication device through NFC. The remote authentication system of the data is realized by adopting MicrochippMCC18Ver3.47 program language, and the number of the transceiver modules is 1.
The code sending module converts the requested data into a 32-byte hexadecimal-coded authorization code command (Janitor-32byte-convert. java):
and the code sending module encrypts an authorization code into a command of 32 bytes of ciphertext according to AES-128 bits (Janitor-AES-Encryt. java):
a command (Janitor-Send. java) that the code sending module sends the encrypted authorization code to the transceiver module:
/**
sending short message
Content of paramsmsBody short message
*/
privatevoidsendSMS(StringsmsBody)
{
UrismsToUri=Uri.parse("smsto:");
Intentintent=newIntent(Intent.ACTION_SENDTO,smsToUri);
intent.putExtra("sms_body",smsBody);
startActivity(intent);
}
The transceiving module forwards a command (MKey-Send. java) of the encrypted authorization code to the authentication module:
and the authentication module judges the decoded data to be legal or valid (NLK-verify.c):
instruction to issue release instruction to execution module or circuit (NLK-pass.c):
Claims (10)
1. A system for remote authentication of data, characterized by: the remote authentication system of the data is provided with a code sending module and an authentication module;
the code sending module receives access permission of operating the authentication equipment and requested data, converts the access permission into an authorization code, encrypts the authorization code again to form an encrypted authorization code, and sends the encrypted authorization code to the authentication module through the electronic text;
the authentication module receives the encryption authorization code sent by the code sending module, identifies the validity of the encryption authorization code and sends a release instruction to the execution module or the circuit.
2. The remote authentication system of data according to claim 1, wherein: and a transceiver module is arranged between the code sending module and the authentication module and is used for receiving the encrypted authorization code sent by the code sending module and forwarding the encrypted authorization code to the authentication module.
3. The remote authentication system of data according to claim 2, wherein: the number of the transceiver modules is not more than 10000.
4. A remote authentication system for data according to claim 3, characterized by: the code sending module forwards the encryption authorization codes to the authentication module through any one of the transceiver modules, or the transceiver modules forward the encryption authorization codes to the authentication module one by one.
5. The remote authentication system of data according to claim 1, wherein: the electronic text is a Short Message Service (SMS), information push of a mobile device application, an instant chat tool (IM) or an Email; the transceiver module forwards the encrypted authorization code to the authentication module, and forwards the encrypted authorization code according to Near Field Communication (NFC), Bluetooth, WiFi, ZigBee protocols or optical modes.
6. The remote authentication system of data according to claim 1, wherein: the requested data is more than one of the ID of the transceiver module, the ID of the requested task, the access timestamp, the ID of the authentication equipment allowing operation, the start-stop time of operation, the effective operation time period and the operation times.
7. The remote authentication system of data according to claim 1, wherein: the encrypted keys are respectively pre-stored in the code sending module and the authentication module and are a group of 16-system numbers.
8. The remote authentication system of data according to claim 1, wherein: the code sending module receives access permission of the operation authentication equipment and data of other requests of additional information, converts the data into 32-byte hexadecimal coding authorization codes, and encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits; and whether the authentication encryption authorization code is valid or not is firstly decoded according to AES-128, and then the authentication module judges that the decoded data is legal or valid.
9. The remote authentication system of data according to claim 8, wherein: and the authentication module judges that the decoded data is illegal or invalid and makes a monitoring log.
10. A remote authentication method of data comprises the following steps:
firstly, after receiving an access requirement or a request of a user, an authorizer sends request data for authorizing the user to operate an authentication device on a code sending device, and the code sending device converts a 32-byte hexadecimal coding authorization code in a BCD coding format; the request is as follows: the system comprises a transceiver module ID, a request task ID, an access timestamp, an authentication device ID allowing operation, operation starting and stopping time, effective operation time period and operation times;
secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code; the encrypted keys are respectively pre-stored in code sending equipment and authentication equipment of an authorizer;
thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail;
after receiving the encrypted authorization code, the user calls the wireless communication equipment on the transceiver equipment and sends the encrypted authorization code to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment;
fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting a prestored AES-128 algorithm key, the authentication device verifies the decrypted request data, judges that the start-stop time, the effective operation time period and the operation times are legal and effective, and sends a release instruction to the execution module or the circuit; and judging whether the decoded data is illegal or invalid, and making a monitoring log.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510590686.9A CN105282148A (en) | 2015-09-17 | 2015-09-17 | Data remote authentication system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510590686.9A CN105282148A (en) | 2015-09-17 | 2015-09-17 | Data remote authentication system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105282148A true CN105282148A (en) | 2016-01-27 |
Family
ID=55150474
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510590686.9A Pending CN105282148A (en) | 2015-09-17 | 2015-09-17 | Data remote authentication system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105282148A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740728A (en) * | 2016-03-30 | 2016-07-06 | 努比亚技术有限公司 | Mobile terminal and data encryption or decryption method |
CN109561428A (en) * | 2018-12-28 | 2019-04-02 | 芜湖机智智能科技有限公司 | Remote authentication method and device thereof, equipment and storage medium |
CN109933997A (en) * | 2019-02-19 | 2019-06-25 | 湖南云数信息科技有限公司 | A kind of automatic vending machine data interactive method, device, equipment and storage medium |
CN115065516A (en) * | 2022-06-06 | 2022-09-16 | 上海华信长安网络科技有限公司 | Method and device for requesting authentication by self-definition for VOIP equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110165859A1 (en) * | 2010-01-04 | 2011-07-07 | Alcatel-Lucent Usa Inc. | Interactive id system using mobile devices |
CN102970674A (en) * | 2012-11-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC) |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
CN104392165A (en) * | 2014-11-10 | 2015-03-04 | 广州日滨科技发展有限公司 | Identity authorization controlling method and system |
-
2015
- 2015-09-17 CN CN201510590686.9A patent/CN105282148A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110165859A1 (en) * | 2010-01-04 | 2011-07-07 | Alcatel-Lucent Usa Inc. | Interactive id system using mobile devices |
CN102970674A (en) * | 2012-11-01 | 2013-03-13 | 中兴通讯股份有限公司 | Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC) |
CN103903319A (en) * | 2014-02-10 | 2014-07-02 | 袁磊 | Electronic lock system based on internet dynamic authorization |
CN104392165A (en) * | 2014-11-10 | 2015-03-04 | 广州日滨科技发展有限公司 | Identity authorization controlling method and system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105740728A (en) * | 2016-03-30 | 2016-07-06 | 努比亚技术有限公司 | Mobile terminal and data encryption or decryption method |
CN109561428A (en) * | 2018-12-28 | 2019-04-02 | 芜湖机智智能科技有限公司 | Remote authentication method and device thereof, equipment and storage medium |
CN109561428B (en) * | 2018-12-28 | 2021-10-29 | 顾宏超 | Remote authentication method, device, equipment and storage medium thereof |
CN109933997A (en) * | 2019-02-19 | 2019-06-25 | 湖南云数信息科技有限公司 | A kind of automatic vending machine data interactive method, device, equipment and storage medium |
CN109933997B (en) * | 2019-02-19 | 2022-10-28 | 湖南云数信息科技有限公司 | Vending machine data interaction method, device, equipment and storage medium |
CN115065516A (en) * | 2022-06-06 | 2022-09-16 | 上海华信长安网络科技有限公司 | Method and device for requesting authentication by self-definition for VOIP equipment |
CN115065516B (en) * | 2022-06-06 | 2024-04-09 | 上海华信长安网络科技有限公司 | Method and device for user-defined request authentication of VOIP equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230007484A1 (en) | Wireless access credential system | |
US11968525B2 (en) | Vehicle digital key sharing service method and system | |
JP5496652B2 (en) | Method for ensuring secure access to a proximity communication module of a mobile terminal | |
JP2011511350A (en) | Access control management method and apparatus | |
US20140329497A1 (en) | Smartdevices Enabled Secure Access to Multiple Entities (SESAME) | |
EP3293995B1 (en) | Locking system and secure token and ownership transfer | |
JP2020057412A (en) | Data security system with encryption | |
KR20080007564A (en) | Method and device for accessing a sim card housed in a mobile terminal | |
CN107733652B (en) | Unlocking method and system for shared vehicle and vehicle lock | |
EP3095266B1 (en) | Access control for a wireless network | |
KR102146748B1 (en) | Digital key based service system and method thereof in mobile trusted environment | |
CN103886661A (en) | Entrance guard management method and system | |
CN105282148A (en) | Data remote authentication system and method | |
KR20120072032A (en) | The system and method for performing mutual authentication of mobile terminal | |
KR101617707B1 (en) | Electronic key system with function for transffering control right for electronic lock system | |
KR101677249B1 (en) | Security Apparatus and Method for Controlling Internet of Things Device Using User Token | |
CN103152326A (en) | Distributed authentication method and authentication system | |
EP2658297A1 (en) | Method and system for accessing a service | |
CN105678542B (en) | payment service interaction method, payment terminal and payment cloud terminal | |
KR101638585B1 (en) | entrance system exploiting smart phone | |
KR102053993B1 (en) | Method for Authenticating by using Certificate | |
KR20150005788A (en) | Method for authenticating by using user's key value | |
KR101934785B1 (en) | Entrance control system | |
KR101853970B1 (en) | Method for Relaying Authentication Number | |
KR102142906B1 (en) | Digital key based service system thereof in mobile trusted environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C41 | Transfer of patent application or patent right or utility model | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20160520 Address after: Lin Xi Lu Longgang District of Shenzhen City, Guangdong province 518172 Shenzhen city students (Longgang) park two Park 407 Applicant after: Intelligent Weishi Technology (Shenzhen ) Co., Ltd. Address before: Futian District Yuanling village Shenzhen city Guangdong province 518000 building 60 room 304 Applicant before: Chu Weige |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160127 |
|
RJ01 | Rejection of invention patent application after publication |