CN106209384B - Use the client terminal of security mechanism and the communication authentication method of charging unit - Google Patents

Use the client terminal of security mechanism and the communication authentication method of charging unit Download PDF

Info

Publication number
CN106209384B
CN106209384B CN201610566212.5A CN201610566212A CN106209384B CN 106209384 B CN106209384 B CN 106209384B CN 201610566212 A CN201610566212 A CN 201610566212A CN 106209384 B CN106209384 B CN 106209384B
Authority
CN
China
Prior art keywords
client terminal
server
charging unit
sid
ciphertext
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610566212.5A
Other languages
Chinese (zh)
Other versions
CN106209384A (en
Inventor
辛丹
朱卓敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Mdt Infotech Ltd
Original Assignee
Shanghai Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Mdt Infotech Ltd filed Critical Shanghai Mdt Infotech Ltd
Priority to CN201610566212.5A priority Critical patent/CN106209384B/en
Publication of CN106209384A publication Critical patent/CN106209384A/en
Application granted granted Critical
Publication of CN106209384B publication Critical patent/CN106209384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to the communication authentication methods of a kind of client terminal using security mechanism and charging unit, are as follows: client terminal sends the final ciphertext at least partly by the unique corresponding public key encryption of the client terminal by Internet of Things net mode to charging unit, the client terminal information whether legal by the request content of Internet of Things net mode reception charging unit forwarding, to complete communication authentication process.It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, are as follows: charging unit by Internet of Things net mode receive client terminal send at least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, it is transmitted to server, the information whether charging unit forwards the request content obtained by server legal by Internet of Things net mode to client terminal, to complete communication authentication process.The present invention realizes the communication authentication between client terminal and charging unit, safety with higher using the unique SID of client terminal, public key, key.

Description

Use the client terminal of security mechanism and the communication authentication method of charging unit
Technical field
The present invention relates to a kind of methods for realizing communication authentication between client terminal and charging unit, especially a kind of Communication authentication method under security mechanism.
Background technique
The existing charging pile solution based on cloud platform includes Cloud Server platform, charging unit and client terminal three It is most of.It in normal use process, is attached first by client terminal and charging unit, then charging unit passes through net Network sends Cloud Server platform for client terminal information and matches;It is laggard that Cloud Server platform receives client terminal information Row authentication and matching issue the information of successful match to charging unit if success, to complete communication authentication, and fill Electric installation just can be carried out the subsequent operation with client terminal in next step after only receiving the information of successful match.But mistake herein Cheng Zhong, the safety problem that client terminal is communicated with charging unit are often ignored, and network hacker utilizes various loopholes, to entire logical Letter link is launched a offensive, and is led to the leakage of many key messages, be will cause heavy losses to user and charging unit enterprise.
Summary of the invention
The object of the present invention is to provide a kind of safety that can be improved communication authentication between client terminal and charging unit, Avoid loss using the client terminal of security mechanism and the communication authentication method of charging unit.
In order to achieve the above objectives, the technical solution adopted by the present invention is that:
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: client terminal The final ciphertext at least partly by the unique corresponding public key encryption of the client terminal is sent to charging unit by Internet of Things net mode, The client terminal information whether legal by request content that Internet of Things net mode receives charging unit forwarding, thus complete At communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The charging unit The final ciphertext is transmitted to the server of its connection, the server by the SID uniquely decrypt by corresponding private key The final ciphertext simultaneously judges whether the request content is legal, and the whether legal information of request content is sent to described fill Electric installation;When the client terminal is to the server registration, by the corresponding SID for generating the client terminal of the server, The public key, the private key, the SID of the client terminal, the public key are sent to the client terminal, institute by the server It states private key to be stored in the server, for communication authentication process use.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public key Encryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SID Key decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its own It is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δ In range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge request After appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisition SID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: charging unit By Internet of Things net mode receive that client terminal sends at least partly by the final of the unique corresponding public key encryption of the client terminal After ciphertext, it is transmitted to server, the charging unit is forwarded to the client terminal by the server by Internet of Things net mode The whether legal information of the request content obtained, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The server is logical Crossing the SID, uniquely corresponding private key decrypts the final ciphertext and judges whether the request content is legal, and will request The whether legal information of content is sent to the charging unit;When the client terminal is to the server registration, by the clothes Be engaged in corresponding SID, the public key, the private key for generating the client terminal of device, the SID of the client terminal, the public key by The server is sent to the client terminal, and the private key is stored in the server, for the communication authentication process It uses.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public key Encryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SID Key decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its own It is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δ In range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge request After appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisition SID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
Due to the above technical solutions, the present invention has the following advantages over the prior art: the present invention utilizes client The unique SID of terminal, public key, key realize the communication authentication between client terminal and charging unit, solve server with And charging unit to client terminal authentication the problem of, the safety problem of transmission and legacy protocol process it is cumbersome, speed The slower problem of rate, safety with higher are more advantageous to user and obtain good experience.
Detailed description of the invention
Attached drawing 1 is the composition schematic diagram of electrically-charging equipment.
Attached drawing 2 is client terminal register flow path figure.
Attached drawing 3 is SID product process figure.
Attached drawing 4 is the communication authentication method flow chart of client terminal and charging unit.
Attached drawing 5 is encryption, decryption flow chart.
Attached drawing 6 is the communication structure figure of client terminal and charging unit.
Specific embodiment
The invention will be further described for embodiment shown in reference to the accompanying drawing.
Embodiment one: as shown in Fig. 1 by user terminal (usually mobile phone), charging unit (charging pile) and server The electrically-charging equipment of composition needs user to pass through client before user is connect by client terminal with charging unit and to be charged Terminal is registered.Register flow path is as shown in Fig. 2, since client terminal often uses mobile phone, register flow path are as follows:
1) user inputs telephone number in client terminal, and is sent to server;
2) server requests to send identifying code to Short Message Service Gateway;
3) identifying code is sent to client terminal by Short Message Service Gateway;
4) after client terminal receives the short message containing identifying code, identifying code is sent to server;
5) identifying code that server is sent according to client terminal completes verifying, and it is unique corresponding for new user to create it SID(Secure ID) and public private key pair (Kpub(Public Key) and Kpri(Private Key)), and by SID and public key Kpub It is sent to client terminal, and private key KpriIt then saves in the server.
In the above process, in order to guarantee the safety of Internet of Things Network Communication, with user orientation server submit application for registration stage, Design a unique user identification code SID for identification for different user, and be different from normal registration process it It is in server is the RSA public private key pair that each user generates a 2048 new bit, is used for subsequent user identity The encryption and decryption of certification and Content of Communication.
In order to guarantee the confidentiality of user information, server can carry out SHA-1 encryption according to the cell-phone number of user, generate 20 The SID of a byte, the convenient phone number for not obtained user easily by malicious attacker in message transmitting procedure.SHA-1 adds Close process is as shown in Fig. 3, and SHA-1 one cycle iterative process is illustrated in diagram: A, B, C, D and E are the blocks of 32bit;F is Non-linear variable;N=5 in < < < n(figure, 30) show the digit of ring shift left, iterative process n is different each time;WtIt is this Take turns the extension information word of t;KtIt is the circulation constant of epicycle t;Right side field word frame indicates to increase by 32 powers of mould 2 in figure.It is inputting End input user mobile phone number, encrypts by SHA-1 after carrying out cover, piecemeal, generates the SID of 20 bytes.SHA-1 Encryption Algorithm It is irreversible, anti-collision, and there is good avalanche effect, so by the SID of the encrypted generation of SHA-1 as user Transmission of the information between client terminal and server has good confidentiality.Calculate user's using SHA-1 in the present invention Summary info not only can guarantee that the SID that different user information generates was different, but also can guarantee in the case where SID leakage, Yong Huxin Breath will not be compromised, so that user be allowed to enjoy higher safety guarantee.
RSA is current most influential public key encryption algorithm, it can resist up to the present known most Cryptographic attack is recommended as public key data encryption standard by ISO.Server firstly generates a pair of 2048 RSA according to SID Key, one of them is privacy key, also referred to as private key, is saved by server;Another is public-key cryptography, can external disclosure, Also referred to as public key sends jointly to user's client terminal together with SID by server and saves.RSA Algorithm is a kind of asymmetric Cryptographic algorithm, it is so-called asymmetric, just refer to that the algorithm needs a pair of secret keys, using one of encryption, then needs to use another It could decrypt.In server end, RSA public private key pair is produced using OPENSSL:
L generates private key: openssl genrsa-out privatekey.key 2048
L corresponds to public key: openssl rsa-in privatekey.key-pubout-out pubkey.key
Use RSA(asymmetric encryption), rather than AES(symmetric cryptography), it is to be obtained since symmetric cryptography decruption key is identical Take one kind of wherein encryption key or decruption key that can crack and forge all data, very not for data transmission security Benefit.So choosing RSA as the encryption method in data transmission, and set private key and be merely stored on server, can prevent Existing identity forgery problem (being more common in man-in-the-middle attack) after the leakage of one side's key.
After completing above-mentioned register flow path, it can be communicated by client terminal with charging unit, it is between the two when completing Communication authentication after, i.e., implementable specific charging instruction.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, for client terminal, This method are as follows: client terminal is sent at least partly to charging unit by the unique corresponding public affairs of the client terminal by Internet of Things net mode The final ciphertext of key encryption, the client terminal letter whether legal by the request content of Internet of Things net mode reception charging unit forwarding Breath, to complete communication authentication process.And for charging unit, this method are as follows: a kind of client using security mechanism is whole The communication authentication method at end and charging unit, this method are as follows: charging unit receives what client terminal was sent by Internet of Things net mode At least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, be transmitted to server, charging unit passes through The whether legal information of the request content that Internet of Things net mode is obtained to client terminal forwarding by server, to complete communication authentication Process.In the above method, final ciphertext includes the unique SID of client terminal and request content;Charging unit turns final ciphertext The server of its connection is issued, uniquely corresponding private key to decrypt final ciphertext and judges that request content is to server by SID It is no legal, and the whether legal information of request content is sent to charging unit;When client terminal is to server registration, by servicing Corresponding SID, public key, the private key for generating client terminal of device, the SID of client terminal, public key are sent to client terminal by server, private Key saves in the server, for the use of communication authentication process.Here Internet of Things net mode be using NFC, bluetooth, zigbee, The communication mode of any one communication protocol in 433M.
The detailed process of this method is as shown in Fig. 4, comprising the following steps:
1) client terminal is established Internet of Things with charging unit and is connect;
2) after connection is established, charging unit sends OK instruction, and notice client terminal can send order;
3) client terminal uses public key, and SID, current request time are stabbed TS(Time Stamp) and charge request content CT(Content splice after) encrypting with SID, obtained data are passed through to the connection of Internet of Things communication module, be sent to charging dress It sets;
4) user data is transmitted to server judgement (passing through HTTPS) by network connection by charging unit;
5) server finds respective private keys according to SID, to data deciphering, stabs TS according to request time and judges having for data packet Effect property/legitimacy (preventing Replay Attack);
6) if request of data is invalid/and it is illegal, server, which is sent, requests invalid response;If request is effective/legal, Server returns to the effective response of request;
7) charging unit executes corresponding operating, and returns result to client terminal.
In the step 3) of the above process, the unique SID of client terminal is adopted with request time stamp TS, charge request content CT With public key KpubEncryption forms level-one ciphertext Kpub(SID, TS, CT), level-one ciphertext Kpub(SID, TS, CT) is whole with client again Unique SID is held to be spliced to form final ciphertext SID | Kpub(SID, TS, CT).Wherein, client terminal is by plaintext character After SID, request time stamp TS, charge request content CT are converted to plaintext byte stream, using public key KpubEncryption forms level-one ciphertext Kpub(SID, TS, CT), as shown in Fig. 5.And in step 5), server splits out final ciphertext SID | Kpub(SID, TS, CT the SID that is spliced in) simultaneously finds the SID uniquely corresponding private key Kpri, pass through private key KpriDecrypt level-one ciphertext Kpub(SID, TS, CT) obtain request time stamp TS.Wherein, server will decrypt level-one ciphertext KpubThe plaintext word that (SID, TS, CT) is obtained After throttling is converted to plaintext character, SID, request time stamp TS, charge request content CT are obtained, as shown in Fig. 5.Server will The timestamp of its own and request time stamp TS are compared and are judged whether request content legal, upon request between stab and server The phase difference of the timestamp of itself then judges that request content is legal in the range of threshold value δ allows.
User is securely communicated by the Internet of Things communication module in client terminal with charging unit, can ensure that user believes The safety of breath, it is ensured that the confidentiality and integrity of entire communication process.Firstly, user opens the Internet of Things Network Communication mould of client terminal Block (the Internet of Things communication module of client terminal is managed at which to work under the control of device), searches neighbouring charging unit, carries out (the Internet of Things communication module of charging unit works under the control of its CPU, and CPU can also connect Wi-Fi mould for Internet of Things connection Block, charging unit and server are connected by HTTPS mode), if successful connection, client terminal, which can obtain, to be filled The title of electric installation equipment and address can be communicated, as shown in Fig. 6.
In terms of above-mentioned communication authentication method essentially consists in the advantage of safety following four:
1, subscriber authentication
The SID decrypted is compared server with the SID splitted out before, if it does, showing to be transmitted across Cheng Anquan, ciphertext are not held as a hostage, and are believable.
2, Brute Force is prevented
2048bit RSA is the one kind for the safest cipher mode being currently known, if using the calculating being currently known Mode, it is impossible to the communication key of client and server is obtained by the way of Brute Force, 2048bit RSA is also army With a kind of cipher mode common in communication.
3, Replay Attack is prevented
It include current time stamp TS in encrypted fields during link transmission, data are passed by Internet of Things communication module It is defeated to arrive charging unit, then server is issued after server decryption by charging unit and obtains the timestamp in field, and with itself Timestamp compares, if the two difference is no more than threshold values δ (δ is determined by network delay and Internet of Things transmission rate), judges For valid data;It otherwise, is invalid data (attack data).
4, man-in-the-middle attack is prevented
The core of man-in-the-middle attack is to need to establish connection respectively with client and charging unit, and can decrypt after connecting The communication key of both sides has used RSA public key encryption for such attack, and go-between can not decrypt, altered data, can not Forged identity, so attack is invalid.
The communication authentication method is that each user generates different public private key pairs in registration phase, even if because pole Situation is held, the leakage of single user's public key will not influence the communication security of other users.Even if client public key leaks, go-between Private key (be stored in server-side, and be not handed down to user) can not be obtained, so the server-side that can not also disguise oneself as, steals user's letter Breath.
In general, in order to guarantee the communication security in charging process, charging unit carry out charging operations when needed for Communication authentication step are as follows: click client terminal open Internet of Things communication module --- being attached with charging unit --- connect Charge request --- charging unit is uploaded to user identity and charge request data by network for client terminal initiation after success --- server carries out authentication --- sending instructions under after success to charging unit ---, and user opens charging operations to server. From above step as can be seen that can also pass through Internet of Things when user cannot pass through network and communicate with charging unit Communication module carries out communication and subsequent operation, and process is not only simple, speed is fast, but also safety is stronger, is more advantageous to user Obtain good experience.The communication authentication method can be successfully applied on the electrically-charging equipment based on cloud platform, can allow new energy Source user vehicle is securely communicated by Internet of Things communication module and charging unit, charge confirmation and charging operations.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the art Scholar cans understand the content of the present invention and implement it accordingly, and it is not intended to limit the scope of the present invention.It is all according to the present invention Equivalent change or modification made by Spirit Essence, should be covered by the protection scope of the present invention.

Claims (8)

1. a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, it is characterised in that: this method are as follows: Client terminal is sent at least partly to charging unit by the unique corresponding public key encryption of the client terminal by Internet of Things net mode Whether final ciphertext, the client terminal are legal by the charge request content that Internet of Things net mode receives the charging unit forwarding Information, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the charge request content;The charging unit The final ciphertext is transmitted to the server of its connection, the server by the SID uniquely decrypt by corresponding private key The final ciphertext simultaneously judges whether the charge request content is legal, and the whether legal information of charge request content is sent To the charging unit;When the client terminal is to the server registration, by the server, corresponding to generate the client whole The SID at end, the public key, the private key, the SID of the client terminal, the public key are sent to the visitor by the server Family terminal, the private key are stored in the server, for communication authentication process use;
The unique SID of client terminal is stabbed with request time, charge request content is close using public key encryption formation level-one Text, the level-one ciphertext are spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private key of the SID, leads to Cross the private key and decrypt the level-one ciphertext and obtain the request time stamp, the server by the timestamp of its own with it is described Request time stamp compares and judges whether the charge request content is legal.
2. it is according to claim 1 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special Sign is: when the request time is stabbed with the phase difference of the timestamp of the server itself in the range of threshold value δ allows, then Judge the charge request content legality.
3. it is according to claim 1 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special Sign is: the SID of plaintext character, request time stamp, the charge request Content Transformation are by the client terminal After plaintext byte stream, level-one ciphertext is formed using the public key encryption;
The server will be decrypted after the plaintext byte circulation that the level-one ciphertext obtains is changed to plaintext character, obtain the SID, The request time stamp, the charge request content.
4. a kind of client terminal and charging unit using security mechanism according to any one of claim 1 to 3 is logical Believe authentication method, it is characterised in that: the Internet of Things net mode is to communicate using any one in NFC, bluetooth, zigbee, 433M The communication mode of agreement.
5. a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, it is characterised in that: this method are as follows: Charging unit by Internet of Things net mode receive client terminal send at least partly by the client terminal, uniquely corresponding public key adds After close final ciphertext, it is transmitted to server, the charging unit is forwarded to the client terminal by institute by Internet of Things net mode The whether legal information of charge request content that server obtains is stated, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the charge request content;The server is logical Crossing the SID, uniquely corresponding private key decrypts the final ciphertext and judges whether the charge request content is legal, and will The whether legal information of charge request content is sent to the charging unit;When the client terminal is to the server registration, By corresponding SID, the public key, the private key for generating the client terminal of the server, the SID of the client terminal, institute It states public key and the client terminal is sent to by the server, the private key is stored in the server, for the communication Verification process uses;
The unique SID of client terminal is stabbed with request time, charge request content is close using public key encryption formation level-one Text, the level-one ciphertext are spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private key of the SID, leads to Cross the private key and decrypt the level-one ciphertext and obtain the request time stamp, the server by the timestamp of its own with it is described Request time stamp compares and judges whether the charge request content is legal.
6. it is according to claim 5 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special Sign is: when the request time is stabbed with the phase difference of the timestamp of the server itself in the range of threshold value δ allows, then Judge the charge request content legality.
7. it is according to claim 5 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special Sign is: the SID of plaintext character, request time stamp, the charge request Content Transformation are by the client terminal After plaintext byte stream, level-one ciphertext is formed using the public key encryption;
The server will be decrypted after the plaintext byte circulation that the level-one ciphertext obtains is changed to plaintext character, obtain the SID, The request time stamp, the charge request content.
8. a kind of client terminal and charging unit using security mechanism according to any one of claims 5 to 7 is logical Believe authentication method, it is characterised in that: the Internet of Things net mode is to communicate using any one in NFC, bluetooth, zigbee, 433M The communication mode of agreement.
CN201610566212.5A 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit Active CN106209384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610566212.5A CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610566212.5A CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Publications (2)

Publication Number Publication Date
CN106209384A CN106209384A (en) 2016-12-07
CN106209384B true CN106209384B (en) 2019-09-10

Family

ID=57493156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610566212.5A Active CN106209384B (en) 2016-07-19 2016-07-19 Use the client terminal of security mechanism and the communication authentication method of charging unit

Country Status (1)

Country Link
CN (1) CN106209384B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108551466A (en) * 2018-03-14 2018-09-18 缤刻普锐(北京)科技有限责任公司 A kind of data processing method and charging unit, data-updating method and system
CN113497812B (en) * 2020-03-18 2024-08-09 瑞昱半导体股份有限公司 Networking authentication system and method for Internet of things
CN116345706A (en) * 2021-12-17 2023-06-27 中兴通讯股份有限公司 NFC wireless charging method, system, electronic device and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790984A (en) * 2004-12-14 2006-06-21 中兴通讯股份有限公司 User identity secret-keeping method in communication system
CN102045340A (en) * 2010-10-15 2011-05-04 国家电网公司 Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
CN103929744A (en) * 2014-04-03 2014-07-16 东南大学 Wireless sensor network key management method
CN104022549A (en) * 2014-06-08 2014-09-03 山东天海科技股份有限公司 Intelligent charging access system for electric automobile

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090217027A1 (en) * 2008-02-21 2009-08-27 Zenlok Corporation Safe e-mail for everybody

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1790984A (en) * 2004-12-14 2006-06-21 中兴通讯股份有限公司 User identity secret-keeping method in communication system
CN102045340A (en) * 2010-10-15 2011-05-04 国家电网公司 Secure data exchange method and system for electric vehicle and charging and exchanging power station
CN103095704A (en) * 2013-01-15 2013-05-08 杭州华三通信技术有限公司 Trusted medium online validation method and device
CN103929744A (en) * 2014-04-03 2014-07-16 东南大学 Wireless sensor network key management method
CN104022549A (en) * 2014-06-08 2014-09-03 山东天海科技股份有限公司 Intelligent charging access system for electric automobile

Also Published As

Publication number Publication date
CN106209384A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CN107800539B (en) Authentication method, authentication device and authentication system
JP4002035B2 (en) A method for transmitting sensitive information using unsecured communications
WO2017114123A1 (en) Key configuration method and key management center, and network element
CN105871920A (en) Communication system and method of terminal and cloud server as well as terminal and cloud server
CN105577680A (en) Key generation method, encrypted data analyzing method, devices and key managing center
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104253801B (en) Realize the methods, devices and systems of login authentication
CN108964897B (en) Identity authentication system and method based on group communication
CN104683291B (en) Session key negotiation method based on IMS system
CN107733635B (en) Data security transmission method based on gateway
CN108712252B (en) Symmetric key pool and relay-crossing based AKA identity authentication system and method
CN108964896B (en) Kerberos identity authentication system and method based on group key pool
CN103118363A (en) Method, system, terminal device and platform device of secret information transmission
CN104901803A (en) Data interaction safety protection method based on CPK identity authentication technology
CN104468126A (en) Safety communication system and method
JP2016519873A (en) Establishing secure voice communication using a generic bootstrapping architecture
CN111970699A (en) Terminal WIFI login authentication method and system based on IPK
Cao et al. LPPA: Lightweight privacy‐preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks
CZ2013373A3 (en) Authentication method of safe data channel
CN106209384B (en) Use the client terminal of security mechanism and the communication authentication method of charging unit
KR102219086B1 (en) HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems
CN102281303A (en) Data exchange method
Leu et al. Improving security level of LTE authentication and key agreement procedure
CN112291196B (en) End-to-end encryption method and system suitable for instant messaging
CN109547303A (en) Control method and relevant device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant