CN105282148A - Data remote authentication system and method - Google Patents

Data remote authentication system and method Download PDF

Info

Publication number
CN105282148A
CN105282148A CN201510590686.9A CN201510590686A CN105282148A CN 105282148 A CN105282148 A CN 105282148A CN 201510590686 A CN201510590686 A CN 201510590686A CN 105282148 A CN105282148 A CN 105282148A
Authority
CN
China
Prior art keywords
authentication
module
code
authorization code
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510590686.9A
Other languages
Chinese (zh)
Inventor
褚维戈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
INTELLIGENT WEISHI TECHNOLOGY (SHENZHEN) Co Ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510590686.9A priority Critical patent/CN105282148A/en
Publication of CN105282148A publication Critical patent/CN105282148A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a data remote authentication system and method, aiming to solve the technical problem of inconvenient data remote authentication. The data remote authentication system is provided with a code sending module and an authentication module. The data remote authentication system includes the following steps that an authorizer sends an encrypted authorization code to a user's transceiver on a code sending device, a user sends the encrypted authorization code to an authentication device for discrimination, the authentication device determines the operation starting and ending time, effective operation time period, validity and effectiveness of operation frequencies, and the authentication device sends a releasing instruction to an execution module or a circuit. Compared with the prior art, the authorizer encrypts the authorization code including various types of information, and then transmits the encrypted authorization code to a user's smart phone, the user uses the received encrypted authorization code to visit the authentication device through the combination with a wireless communication means, so that a series of problems of data transmission, data protection, remote authentication of remote authorization and authorization cancel are solved, and the remote authorization is realized.

Description

remote authentication system and method for data
Technical Field
The present invention relates to a remote control system and method, and more particularly, to a remote authentication system and method for requesting data.
Background
Authentication refers to verifying whether a user has the right to access a visited system. The application scenarios of authentication are very wide, such as: computer account login and access control. The common authentication methods include password authentication, key authentication, Radio Frequency Identification (RFID) authentication and biometric authentication. The biometric authentication is specific to a specially assigned person and is not in the scope of remote authorization. Such as: theoretically you cannot lend your fingerprint to others for use, so it is not possible to authorize others to use your fingerprint to access the access control system.
The authentication mode comparison in the prior art:
wherein,
1) the password authentication is that when a user is established, a password needs to be allocated to the user, and the password of the user can be designated by an administrator or can be applied by the user. The password is simple and convenient to send and use, but the weakness of the method is obvious: once the password is stolen or lost, the situation is very troublesome, an administrator needs to modify the password of the user again, and before the password is modified, the legal identity of the user is often verified manually. Similarly, if time and frequency control is added to the password, administrator intervention is also required. Such a mode of operation is relatively inefficient and relatively costly to maintain.
2) Key verification, which is the main authentication method adopted by the current access control system. The authorization of the authentication system usually adopts an original key management method, and an authorizer gives a key to a user in a face-to-face mode, the user operates on corresponding authentication equipment such as an entrance guard, and the key is returned to the authorizer after the use is finished. The face-to-face authorization method has the defects that sometimes authorizers such as a key manager, a user and equipment to be authenticated are far away from each other, the face-to-face key delivery mode is low in efficiency, the risk that the key is copied exists, and the efficiency cannot be improved even if the modern logistics express delivery method is adopted.
3) The integrated circuit IC card is used as an improvement of the traditional mechanical key and replaces the traditional mechanical key with the integrated circuit IC card. However, this method only solves the problem of preventing the key from being copied, and fails to solve the problem of the efficiency of authorized issuing.
Therefore, the prior art has no ideal technical solution for solving the remote authentication.
Disclosure of Invention
The invention aims to provide a system and a method for remote authentication of data, and aims to solve the technical problem of facilitating remote authentication of data.
The invention adopts the following technical scheme that the remote authentication system for data is provided with a code sending module and an authentication module;
the code sending module receives access permission of operating the authentication equipment and requested data, converts the access permission into an authorization code, encrypts the authorization code again to form an encrypted authorization code, and sends the encrypted authorization code to the authentication module through the electronic text;
the authentication module receives the encryption authorization code sent by the code sending module, identifies the validity of the encryption authorization code and sends a release instruction to the execution module or the circuit.
A receiving and sending module is arranged between the code sending module and the authentication module and used for receiving the encryption authorization code sent by the code sending module and forwarding the encryption authorization code to the authentication module.
The number of the transceiver modules of the present invention is not more than 10000.
The code sending module of the invention forwards the encryption authorization code to the authentication module through any transceiver module, or the transceiver module forwards the encryption authorization code to the authentication module one by one.
The electronic text of the invention is short message, information push of mobile equipment application, instant chat tool or e-mail; the transceiver module forwards the encrypted authorization code to the authentication module, and forwards the encrypted authorization code according to a short-distance wireless communication Bluetooth, WiFi, ZigBee protocol or an optical mode.
The requested data of the invention is more than one of the ID of the transceiver module, the ID of the requested task, the access timestamp, the ID of the authentication equipment allowing operation, the start-stop time of the operation, the effective operation time period and the operation times.
The encrypted keys of the invention are respectively pre-stored in the code sending module and the authentication module and are a group of 16-system numbers.
The code sending module receives access permission of the operation authentication equipment and data of other requests of additional information, converts the data into 32-byte hexadecimal coding authorization codes, and encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits; and whether the authentication encryption authorization code is valid or not is firstly decoded according to AES-128, and then the authentication module judges that the decoded data is legal or valid.
The authentication module of the invention judges that the decoded data is illegal or invalid and makes a monitoring log.
The invention discloses a remote authentication method of data, which comprises the following steps:
firstly, after receiving an access requirement or a request of a user, an authorizer sends request data for authorizing the user to operate an authentication device on a code sending device, and the code sending device converts a 32-byte hexadecimal coding authorization code in a BCD coding format; the request is as follows: the system comprises a transceiver module ID, a request task ID, an access timestamp, an authentication device ID allowing operation, operation starting and stopping time, effective operation time period and operation times;
secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code; the encrypted keys are respectively pre-stored in code sending equipment and authentication equipment of an authorizer;
thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail;
after receiving the encrypted authorization code, the user calls the wireless communication equipment on the transceiver equipment and sends the encrypted authorization code to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment;
fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting a prestored AES-128 algorithm key, the authentication device verifies the decrypted request data, judges that the start-stop time, the effective operation time period and the operation times are legal and effective, and sends a release instruction to the execution module or the circuit; and judging whether the decoded data is illegal or invalid, and making a monitoring log.
Compared with the prior art, the invention has the advantages that an authorizer encrypts the authorization code containing various information, transmits the authorization code to the smart phone of the user by using a public communication network, and then the user accesses the authentication equipment by using the received encrypted authorization code by combining a wireless communication means, such as: the entrance guard solves a series of problems encountered by data transmission, data protection, remote authentication and authorization cancellation of remote authorization, thereby realizing remote authorization.
Drawings
FIG. 1 is a schematic diagram of the system architecture of the present invention.
FIG. 2 is a schematic diagram of an embodiment of the system of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. As shown in fig. 1, the remote authentication system (system) for data of the present invention is provided with a code sending module, a transceiver module and an authentication module.
The code sending module receives data of access permission and other additional information requests of an authorized user for operating certain authentication equipment, converts the data into 32-byte hexadecimal coding authorization codes according to a custom data structure in a BCD coding format, encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits to form encrypted authorization codes, and sends the encrypted authorization codes to the receiving and sending module through a short message SMS, information push applied by mobile equipment, an instant chat tool IM or an Email, or any communication form of universal electronic text sending. The requested data is more than one of the transceiver module ID, the request task ID, the access time stamp, the authentication device ID allowing operation, the operation (access) start-stop time, the valid operation period and the operation times. The encrypted key is set by an authorized person and is respectively pre-stored in the code sending module and the authentication module and is a group of 16-system numbers.
The custom data structure is:
7 bytes 2 bytes 7 bytes 1-byte 10-byte 4-byte 1-byte
Task ID Lock number Region coding Number of times Start and end time Period of validity Week
The transceiver module receives the encryption authorization code sent by the code sending module and forwards the encryption authorization code to the authentication module according to the near field communication NFC, Bluetooth, WiFi, ZigBee protocol or optical mode. The transceiver module is mastered and used by a user, and is relatively easy to attack or decompile. However, the transceiver module does not decrypt the encrypted authorization code and is only responsible for forwarding to the authentication module, and the transceiver module does not store the encryption key, so that the AES-128 encryption key of the encrypted authorization code cannot be revealed in the link.
The authentication module receives the encrypted authorization code sent by the transceiver module, identifies whether the encrypted authorization code is valid or not, firstly decodes according to AES-128, then judges whether the decoded data is legal or valid, and finally sends a release instruction to the execution module or the circuit, for example, when the authentication device is an access control system, the authentication module sends an access control opening instruction to the electromagnetic device of the access control, the electromagnetic device is powered off and has no magnetic force after receiving the instruction, and the door is opened; and if the decoded data is judged to be illegal or invalid, making a monitoring log.
The code sending module is arranged on the code sending device, the code sending device is an intelligent terminal, and can be a mobile terminal device adopting an iOS system or an Android system, or any other intelligent terminal device, such as: the mobile phone operating system is a Windows Phone device, a blackberry or a handheld device of a customized system, a personal computer PC adopting a Windows system or a Linux system, or a server adopting a Windows system or a Linux system.
The receiving and sending module is arranged on receiving and sending equipment, and the receiving and sending equipment is Bluetooth communication equipment, Near Field Communication (NFC) equipment, wireless fidelity (WiFi) wireless communication equipment, ZigBee equipment or two-dimensional code generating equipment, such as a smart phone, a tablet computer or radio frequency receiving and sending equipment.
The authentication module is arranged on the authentication device, and the authentication device may be a fixed or mobile electronic device, or a terminal device of a cloud server, such as: the system comprises an access control device, a handheld POS machine, an automobile security system, a smart phone, a personal computer or a server of a security control center of a property company.
The code sending equipment and the receiving and sending equipment are connected through a public network, and the public network is a wireless communication network and the Internet. The transceiving equipment and the authentication equipment adopt Bluetooth, NFC, WiFi, ZigBee communication or optical communication.
As shown in FIG. 2, the number of the transceiver modules is 0-10000, and the transceiver modules are arranged on equipment capable of transceiving electronic texts. And after the code sending module sends the encryption authorization code, the encryption authorization code is transmitted to the authentication module through 0-10000 transceiver modules. The number of the transceiver modules can be specifically set according to the actual working scene or the needs of the system.
If the number of the receiving and sending modules is 0, namely the receiving and sending modules are not arranged, the code sending device is connected with the authentication device through a public network at the moment, the code sending module directly communicates with the authentication module to carry out direct authentication, and under the mode, the code sending module directly sends the encryption authorization code to the authentication module.
If the number of the transceiver modules is more than 1, the code sending module forwards the encrypted authorization code to the authentication module through any transceiver module, and when the system allows the transceiver modules to be anonymous, the encrypted authorization code received by each transceiver module is judged to be valid by the authentication module. Some systems with high requirements on security performance can specify that the encrypted authorization code received by one transceiver module can only be judged to be valid by the authentication module, and other transceiver modules cannot be judged to be valid by the authentication device even if the other transceiver modules receive the encrypted authorization code forwarded by the specified transceiver module or sent by the code sending module. In such a system, an authentication module needs to be added to determine the ID number ID of the transceiver module.
Or the encryption authorization code can be forwarded to the authentication module one by one according to a plurality of transceiver modules. For example: the number of the receiving and sending modules is 2, and the code sending module forwards the encryption authorization codes to the authentication module one by one through the two receiving and sending modules. The code sending module sends the encrypted authorization code to a transceiver module arranged on the mobile phone through a public network, the transceiver module sends the encrypted authorization code to the transceiver module arranged on the access control equipment through wireless communication after receiving the encrypted authorization code, and the transceiver module of the access control equipment forwards the encrypted authorization code to an authentication module of a server of a control center through a port or a module which is provided with the transceiver module and used for accessing the internet, such as: and the server of the security control center of the property company performs networking authentication, identifies whether the encrypted authorization code is valid or not, decodes according to AES-128 and judges whether the decoded data is valid or not. And if the password is legal or valid, forwarding a release instruction to the access control equipment through the network. After the entrance guard equipment receives the release instruction, the corresponding electromagnetic equipment is powered off immediately and has no magnetic force, and the door is opened.
The invention discloses a remote authentication method of data, which comprises the following steps:
firstly, after receiving the access requirement or request of a user, an authorizer sends request data for authorizing the user to operate certain authentication equipment on code sending equipment, and the code sending equipment converts a 32-byte hexadecimal coding authorization code in a BCD coding format according to a self-defined data structure. The request is as follows: the service provider may further include one or more of a transceiver module ID, a request task ID, an access time stamp, an authentication device ID allowing an operation, an operation (access) start-stop time, a valid operation period, and the number of operations.
And secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code. The encrypted key is set by the authorizer and is respectively stored in the code sending device and the authentication device of the authorizer in advance.
And thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail.
After receiving the encryption authorization code, the user calls the wireless communication equipment on the transceiver equipment, such as: bluetooth, NFC, WiFi, ZigBee or optical communication are sent to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment.
And fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting the prestored AES-128 algorithm key. The authentication device checks the decrypted request data and judges whether the current authentication device is allowed to be accessed, the access starting and stopping time, the effective operation time interval and the operation times are legal and effective. If the authentication equipment is valid, the authentication equipment sends a release instruction to the execution module or the circuit, if the authentication equipment is an access control system, the authentication module sends an access control opening instruction to the access control electromagnetic equipment, and the electromagnetic equipment is powered off and has no magnetic force after receiving the instruction, the door is opened; and if the decoded data is judged to be illegal or invalid, making a monitoring log.
The invention discloses a method for authenticating access request data sent by an authorizer to a remote user by remote equipment under the condition of ensuring that the access request data is not tampered and cracked. The system can be popularized to self-service hotels, equipment patrol maintenance, article storage and transportation, equipment sharing use and access control management.
In this embodiment, the code sending device adopts a hua che 7 mobile phone, the transceiver device adopts an LGNEXUS5 mobile phone, the authentication device adopts an IUIVS105 door lock of shenzhen limited technologies, the code sending device is connected with the transceiver device through a mobile communication network, sends and receives the encrypted authorization code through a short message, and the transceiver device is connected with the authentication device through NFC. The remote authentication system of the data is realized by adopting MicrochippMCC18Ver3.47 program language, and the number of the transceiver modules is 1.
The code sending module converts the requested data into a 32-byte hexadecimal-coded authorization code command (Janitor-32byte-convert. java):
and the code sending module encrypts an authorization code into a command of 32 bytes of ciphertext according to AES-128 bits (Janitor-AES-Encryt. java):
a command (Janitor-Send. java) that the code sending module sends the encrypted authorization code to the transceiver module:
/**
sending short message
Content of paramsmsBody short message
*/
privatevoidsendSMS(StringsmsBody)
{
UrismsToUri=Uri.parse("smsto:");
Intentintent=newIntent(Intent.ACTION_SENDTO,smsToUri);
intent.putExtra("sms_body",smsBody);
startActivity(intent);
}
The transceiving module forwards a command (MKey-Send. java) of the encrypted authorization code to the authentication module:
and the authentication module judges the decoded data to be legal or valid (NLK-verify.c):
instruction to issue release instruction to execution module or circuit (NLK-pass.c):

Claims (10)

1. A system for remote authentication of data, characterized by: the remote authentication system of the data is provided with a code sending module and an authentication module;
the code sending module receives access permission of operating the authentication equipment and requested data, converts the access permission into an authorization code, encrypts the authorization code again to form an encrypted authorization code, and sends the encrypted authorization code to the authentication module through the electronic text;
the authentication module receives the encryption authorization code sent by the code sending module, identifies the validity of the encryption authorization code and sends a release instruction to the execution module or the circuit.
2. The remote authentication system of data according to claim 1, wherein: and a transceiver module is arranged between the code sending module and the authentication module and is used for receiving the encrypted authorization code sent by the code sending module and forwarding the encrypted authorization code to the authentication module.
3. The remote authentication system of data according to claim 2, wherein: the number of the transceiver modules is not more than 10000.
4. A remote authentication system for data according to claim 3, characterized by: the code sending module forwards the encryption authorization codes to the authentication module through any one of the transceiver modules, or the transceiver modules forward the encryption authorization codes to the authentication module one by one.
5. The remote authentication system of data according to claim 1, wherein: the electronic text is a Short Message Service (SMS), information push of a mobile device application, an instant chat tool (IM) or an Email; the transceiver module forwards the encrypted authorization code to the authentication module, and forwards the encrypted authorization code according to Near Field Communication (NFC), Bluetooth, WiFi, ZigBee protocols or optical modes.
6. The remote authentication system of data according to claim 1, wherein: the requested data is more than one of the ID of the transceiver module, the ID of the requested task, the access timestamp, the ID of the authentication equipment allowing operation, the start-stop time of operation, the effective operation time period and the operation times.
7. The remote authentication system of data according to claim 1, wherein: the encrypted keys are respectively pre-stored in the code sending module and the authentication module and are a group of 16-system numbers.
8. The remote authentication system of data according to claim 1, wherein: the code sending module receives access permission of the operation authentication equipment and data of other requests of additional information, converts the data into 32-byte hexadecimal coding authorization codes, and encrypts the authorization codes into 32-byte ciphertext according to AES-128 bits; and whether the authentication encryption authorization code is valid or not is firstly decoded according to AES-128, and then the authentication module judges that the decoded data is legal or valid.
9. The remote authentication system of data according to claim 8, wherein: and the authentication module judges that the decoded data is illegal or invalid and makes a monitoring log.
10. A remote authentication method of data comprises the following steps:
firstly, after receiving an access requirement or a request of a user, an authorizer sends request data for authorizing the user to operate an authentication device on a code sending device, and the code sending device converts a 32-byte hexadecimal coding authorization code in a BCD coding format; the request is as follows: the system comprises a transceiver module ID, a request task ID, an access timestamp, an authentication device ID allowing operation, operation starting and stopping time, effective operation time period and operation times;
secondly, the authorized person encrypts the authorization code by using an AES-128 algorithm to obtain an encrypted authorization code; the encrypted keys are respectively pre-stored in code sending equipment and authentication equipment of an authorizer;
thirdly, the encrypted authorization code is sent to the receiving and sending equipment of the user through a public communication network according to the short message, the information push applied by the mobile terminal, the instant chat tool or the e-mail;
after receiving the encrypted authorization code, the user calls the wireless communication equipment on the transceiver equipment and sends the encrypted authorization code to the authentication equipment for discrimination, or the two-dimensional code is scanned by the authentication equipment;
fifthly, after receiving the encryption authorization code, the transceiver of the authentication device decrypts by adopting a prestored AES-128 algorithm key, the authentication device verifies the decrypted request data, judges that the start-stop time, the effective operation time period and the operation times are legal and effective, and sends a release instruction to the execution module or the circuit; and judging whether the decoded data is illegal or invalid, and making a monitoring log.
CN201510590686.9A 2015-09-17 2015-09-17 Data remote authentication system and method Pending CN105282148A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510590686.9A CN105282148A (en) 2015-09-17 2015-09-17 Data remote authentication system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510590686.9A CN105282148A (en) 2015-09-17 2015-09-17 Data remote authentication system and method

Publications (1)

Publication Number Publication Date
CN105282148A true CN105282148A (en) 2016-01-27

Family

ID=55150474

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510590686.9A Pending CN105282148A (en) 2015-09-17 2015-09-17 Data remote authentication system and method

Country Status (1)

Country Link
CN (1) CN105282148A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740728A (en) * 2016-03-30 2016-07-06 努比亚技术有限公司 Mobile terminal and data encryption or decryption method
CN109561428A (en) * 2018-12-28 2019-04-02 芜湖机智智能科技有限公司 Remote authentication method and device thereof, equipment and storage medium
CN109933997A (en) * 2019-02-19 2019-06-25 湖南云数信息科技有限公司 A kind of automatic vending machine data interactive method, device, equipment and storage medium
CN115065516A (en) * 2022-06-06 2022-09-16 上海华信长安网络科技有限公司 Method and device for requesting authentication by self-definition for VOIP equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110165859A1 (en) * 2010-01-04 2011-07-07 Alcatel-Lucent Usa Inc. Interactive id system using mobile devices
CN102970674A (en) * 2012-11-01 2013-03-13 中兴通讯股份有限公司 Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC)
CN103903319A (en) * 2014-02-10 2014-07-02 袁磊 Electronic lock system based on internet dynamic authorization
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110165859A1 (en) * 2010-01-04 2011-07-07 Alcatel-Lucent Usa Inc. Interactive id system using mobile devices
CN102970674A (en) * 2012-11-01 2013-03-13 中兴通讯股份有限公司 Method and system for achieving temporary dynamic authorization by utilizing near field communication (NFC)
CN103903319A (en) * 2014-02-10 2014-07-02 袁磊 Electronic lock system based on internet dynamic authorization
CN104392165A (en) * 2014-11-10 2015-03-04 广州日滨科技发展有限公司 Identity authorization controlling method and system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740728A (en) * 2016-03-30 2016-07-06 努比亚技术有限公司 Mobile terminal and data encryption or decryption method
CN109561428A (en) * 2018-12-28 2019-04-02 芜湖机智智能科技有限公司 Remote authentication method and device thereof, equipment and storage medium
CN109561428B (en) * 2018-12-28 2021-10-29 顾宏超 Remote authentication method, device, equipment and storage medium thereof
CN109933997A (en) * 2019-02-19 2019-06-25 湖南云数信息科技有限公司 A kind of automatic vending machine data interactive method, device, equipment and storage medium
CN109933997B (en) * 2019-02-19 2022-10-28 湖南云数信息科技有限公司 Vending machine data interaction method, device, equipment and storage medium
CN115065516A (en) * 2022-06-06 2022-09-16 上海华信长安网络科技有限公司 Method and device for requesting authentication by self-definition for VOIP equipment
CN115065516B (en) * 2022-06-06 2024-04-09 上海华信长安网络科技有限公司 Method and device for user-defined request authentication of VOIP equipment

Similar Documents

Publication Publication Date Title
US20230007484A1 (en) Wireless access credential system
US11968525B2 (en) Vehicle digital key sharing service method and system
JP5496652B2 (en) Method for ensuring secure access to a proximity communication module of a mobile terminal
JP2011511350A (en) Access control management method and apparatus
US20140329497A1 (en) Smartdevices Enabled Secure Access to Multiple Entities (SESAME)
EP3293995B1 (en) Locking system and secure token and ownership transfer
JP2020057412A (en) Data security system with encryption
KR20080007564A (en) Method and device for accessing a sim card housed in a mobile terminal
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
EP3095266B1 (en) Access control for a wireless network
KR102146748B1 (en) Digital key based service system and method thereof in mobile trusted environment
CN103886661A (en) Entrance guard management method and system
CN105282148A (en) Data remote authentication system and method
KR20120072032A (en) The system and method for performing mutual authentication of mobile terminal
KR101617707B1 (en) Electronic key system with function for transffering control right for electronic lock system
KR101677249B1 (en) Security Apparatus and Method for Controlling Internet of Things Device Using User Token
CN103152326A (en) Distributed authentication method and authentication system
EP2658297A1 (en) Method and system for accessing a service
CN105678542B (en) payment service interaction method, payment terminal and payment cloud terminal
KR101638585B1 (en) entrance system exploiting smart phone
KR102053993B1 (en) Method for Authenticating by using Certificate
KR20150005788A (en) Method for authenticating by using user's key value
KR101934785B1 (en) Entrance control system
KR101853970B1 (en) Method for Relaying Authentication Number
KR102142906B1 (en) Digital key based service system thereof in mobile trusted environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20160520

Address after: Lin Xi Lu Longgang District of Shenzhen City, Guangdong province 518172 Shenzhen city students (Longgang) park two Park 407

Applicant after: Intelligent Weishi Technology (Shenzhen ) Co., Ltd.

Address before: Futian District Yuanling village Shenzhen city Guangdong province 518000 building 60 room 304

Applicant before: Chu Weige

RJ01 Rejection of invention patent application after publication

Application publication date: 20160127

RJ01 Rejection of invention patent application after publication