CN106209384B - Use the client terminal of security mechanism and the communication authentication method of charging unit - Google Patents
Use the client terminal of security mechanism and the communication authentication method of charging unit Download PDFInfo
- Publication number
- CN106209384B CN106209384B CN201610566212.5A CN201610566212A CN106209384B CN 106209384 B CN106209384 B CN 106209384B CN 201610566212 A CN201610566212 A CN 201610566212A CN 106209384 B CN106209384 B CN 106209384B
- Authority
- CN
- China
- Prior art keywords
- client terminal
- server
- charging unit
- sid
- ciphertext
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to the communication authentication methods of a kind of client terminal using security mechanism and charging unit, are as follows: client terminal sends the final ciphertext at least partly by the unique corresponding public key encryption of the client terminal by Internet of Things net mode to charging unit, the client terminal information whether legal by the request content of Internet of Things net mode reception charging unit forwarding, to complete communication authentication process.It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, are as follows: charging unit by Internet of Things net mode receive client terminal send at least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, it is transmitted to server, the information whether charging unit forwards the request content obtained by server legal by Internet of Things net mode to client terminal, to complete communication authentication process.The present invention realizes the communication authentication between client terminal and charging unit, safety with higher using the unique SID of client terminal, public key, key.
Description
Technical field
The present invention relates to a kind of methods for realizing communication authentication between client terminal and charging unit, especially a kind of
Communication authentication method under security mechanism.
Background technique
The existing charging pile solution based on cloud platform includes Cloud Server platform, charging unit and client terminal three
It is most of.It in normal use process, is attached first by client terminal and charging unit, then charging unit passes through net
Network sends Cloud Server platform for client terminal information and matches;It is laggard that Cloud Server platform receives client terminal information
Row authentication and matching issue the information of successful match to charging unit if success, to complete communication authentication, and fill
Electric installation just can be carried out the subsequent operation with client terminal in next step after only receiving the information of successful match.But mistake herein
Cheng Zhong, the safety problem that client terminal is communicated with charging unit are often ignored, and network hacker utilizes various loopholes, to entire logical
Letter link is launched a offensive, and is led to the leakage of many key messages, be will cause heavy losses to user and charging unit enterprise.
Summary of the invention
The object of the present invention is to provide a kind of safety that can be improved communication authentication between client terminal and charging unit,
Avoid loss using the client terminal of security mechanism and the communication authentication method of charging unit.
In order to achieve the above objectives, the technical solution adopted by the present invention is that:
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: client terminal
The final ciphertext at least partly by the unique corresponding public key encryption of the client terminal is sent to charging unit by Internet of Things net mode,
The client terminal information whether legal by request content that Internet of Things net mode receives charging unit forwarding, thus complete
At communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The charging unit
The final ciphertext is transmitted to the server of its connection, the server by the SID uniquely decrypt by corresponding private key
The final ciphertext simultaneously judges whether the request content is legal, and the whether legal information of request content is sent to described fill
Electric installation;When the client terminal is to the server registration, by the corresponding SID for generating the client terminal of the server,
The public key, the private key, the SID of the client terminal, the public key are sent to the client terminal, institute by the server
It states private key to be stored in the server, for communication authentication process use.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public key
Encryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SID
Key decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its own
It is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δ
In range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge request
After appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisition
SID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, this method are as follows: charging unit
By Internet of Things net mode receive that client terminal sends at least partly by the final of the unique corresponding public key encryption of the client terminal
After ciphertext, it is transmitted to server, the charging unit is forwarded to the client terminal by the server by Internet of Things net mode
The whether legal information of the request content obtained, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the request content;The server is logical
Crossing the SID, uniquely corresponding private key decrypts the final ciphertext and judges whether the request content is legal, and will request
The whether legal information of content is sent to the charging unit;When the client terminal is to the server registration, by the clothes
Be engaged in corresponding SID, the public key, the private key for generating the client terminal of device, the SID of the client terminal, the public key by
The server is sent to the client terminal, and the private key is stored in the server, for the communication authentication process
It uses.
In above scheme, the unique SID of client terminal and request time stamp, charge request content use the public key
Encryption forms level-one ciphertext, and the level-one ciphertext is spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private of the SID
Key decrypts the level-one ciphertext by the private key and obtains the request time and stabs, and the server is by the timestamp of its own
It is compared with request time stamp and judges whether the request content is legal.
Preferably, allow when the phase difference of request time stamp and the timestamp of the server itself in threshold value δ
In range, then judge that the request content is legal.
Preferably, the client terminal will be in the SID of plaintext character, request time stamp, the charge request
After appearance is converted to plaintext byte stream, level-one ciphertext is formed using the public key encryption;
After the plaintext byte circulation that the server will decrypt the level-one ciphertext acquisition is changed to plaintext character, described in acquisition
SID, request time stamp, the charge request content.
The Internet of Things net mode is the communication mode using any one communication protocol in NFC, bluetooth, zigbee, 433M.
Due to the above technical solutions, the present invention has the following advantages over the prior art: the present invention utilizes client
The unique SID of terminal, public key, key realize the communication authentication between client terminal and charging unit, solve server with
And charging unit to client terminal authentication the problem of, the safety problem of transmission and legacy protocol process it is cumbersome, speed
The slower problem of rate, safety with higher are more advantageous to user and obtain good experience.
Detailed description of the invention
Attached drawing 1 is the composition schematic diagram of electrically-charging equipment.
Attached drawing 2 is client terminal register flow path figure.
Attached drawing 3 is SID product process figure.
Attached drawing 4 is the communication authentication method flow chart of client terminal and charging unit.
Attached drawing 5 is encryption, decryption flow chart.
Attached drawing 6 is the communication structure figure of client terminal and charging unit.
Specific embodiment
The invention will be further described for embodiment shown in reference to the accompanying drawing.
Embodiment one: as shown in Fig. 1 by user terminal (usually mobile phone), charging unit (charging pile) and server
The electrically-charging equipment of composition needs user to pass through client before user is connect by client terminal with charging unit and to be charged
Terminal is registered.Register flow path is as shown in Fig. 2, since client terminal often uses mobile phone, register flow path are as follows:
1) user inputs telephone number in client terminal, and is sent to server;
2) server requests to send identifying code to Short Message Service Gateway;
3) identifying code is sent to client terminal by Short Message Service Gateway;
4) after client terminal receives the short message containing identifying code, identifying code is sent to server;
5) identifying code that server is sent according to client terminal completes verifying, and it is unique corresponding for new user to create it
SID(Secure ID) and public private key pair (Kpub(Public Key) and Kpri(Private Key)), and by SID and public key Kpub
It is sent to client terminal, and private key KpriIt then saves in the server.
In the above process, in order to guarantee the safety of Internet of Things Network Communication, with user orientation server submit application for registration stage,
Design a unique user identification code SID for identification for different user, and be different from normal registration process it
It is in server is the RSA public private key pair that each user generates a 2048 new bit, is used for subsequent user identity
The encryption and decryption of certification and Content of Communication.
In order to guarantee the confidentiality of user information, server can carry out SHA-1 encryption according to the cell-phone number of user, generate 20
The SID of a byte, the convenient phone number for not obtained user easily by malicious attacker in message transmitting procedure.SHA-1 adds
Close process is as shown in Fig. 3, and SHA-1 one cycle iterative process is illustrated in diagram: A, B, C, D and E are the blocks of 32bit;F is
Non-linear variable;N=5 in < < < n(figure, 30) show the digit of ring shift left, iterative process n is different each time;WtIt is this
Take turns the extension information word of t;KtIt is the circulation constant of epicycle t;Right side field word frame indicates to increase by 32 powers of mould 2 in figure.It is inputting
End input user mobile phone number, encrypts by SHA-1 after carrying out cover, piecemeal, generates the SID of 20 bytes.SHA-1 Encryption Algorithm
It is irreversible, anti-collision, and there is good avalanche effect, so by the SID of the encrypted generation of SHA-1 as user
Transmission of the information between client terminal and server has good confidentiality.Calculate user's using SHA-1 in the present invention
Summary info not only can guarantee that the SID that different user information generates was different, but also can guarantee in the case where SID leakage, Yong Huxin
Breath will not be compromised, so that user be allowed to enjoy higher safety guarantee.
RSA is current most influential public key encryption algorithm, it can resist up to the present known most
Cryptographic attack is recommended as public key data encryption standard by ISO.Server firstly generates a pair of 2048 RSA according to SID
Key, one of them is privacy key, also referred to as private key, is saved by server;Another is public-key cryptography, can external disclosure,
Also referred to as public key sends jointly to user's client terminal together with SID by server and saves.RSA Algorithm is a kind of asymmetric
Cryptographic algorithm, it is so-called asymmetric, just refer to that the algorithm needs a pair of secret keys, using one of encryption, then needs to use another
It could decrypt.In server end, RSA public private key pair is produced using OPENSSL:
L generates private key: openssl genrsa-out privatekey.key 2048
L corresponds to public key: openssl rsa-in privatekey.key-pubout-out pubkey.key
Use RSA(asymmetric encryption), rather than AES(symmetric cryptography), it is to be obtained since symmetric cryptography decruption key is identical
Take one kind of wherein encryption key or decruption key that can crack and forge all data, very not for data transmission security
Benefit.So choosing RSA as the encryption method in data transmission, and set private key and be merely stored on server, can prevent
Existing identity forgery problem (being more common in man-in-the-middle attack) after the leakage of one side's key.
After completing above-mentioned register flow path, it can be communicated by client terminal with charging unit, it is between the two when completing
Communication authentication after, i.e., implementable specific charging instruction.
It is a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, for client terminal,
This method are as follows: client terminal is sent at least partly to charging unit by the unique corresponding public affairs of the client terminal by Internet of Things net mode
The final ciphertext of key encryption, the client terminal letter whether legal by the request content of Internet of Things net mode reception charging unit forwarding
Breath, to complete communication authentication process.And for charging unit, this method are as follows: a kind of client using security mechanism is whole
The communication authentication method at end and charging unit, this method are as follows: charging unit receives what client terminal was sent by Internet of Things net mode
At least partly by the client terminal uniquely final ciphertext of corresponding public key encryption after, be transmitted to server, charging unit passes through
The whether legal information of the request content that Internet of Things net mode is obtained to client terminal forwarding by server, to complete communication authentication
Process.In the above method, final ciphertext includes the unique SID of client terminal and request content;Charging unit turns final ciphertext
The server of its connection is issued, uniquely corresponding private key to decrypt final ciphertext and judges that request content is to server by SID
It is no legal, and the whether legal information of request content is sent to charging unit;When client terminal is to server registration, by servicing
Corresponding SID, public key, the private key for generating client terminal of device, the SID of client terminal, public key are sent to client terminal by server, private
Key saves in the server, for the use of communication authentication process.Here Internet of Things net mode be using NFC, bluetooth, zigbee,
The communication mode of any one communication protocol in 433M.
The detailed process of this method is as shown in Fig. 4, comprising the following steps:
1) client terminal is established Internet of Things with charging unit and is connect;
2) after connection is established, charging unit sends OK instruction, and notice client terminal can send order;
3) client terminal uses public key, and SID, current request time are stabbed TS(Time Stamp) and charge request content
CT(Content splice after) encrypting with SID, obtained data are passed through to the connection of Internet of Things communication module, be sent to charging dress
It sets;
4) user data is transmitted to server judgement (passing through HTTPS) by network connection by charging unit;
5) server finds respective private keys according to SID, to data deciphering, stabs TS according to request time and judges having for data packet
Effect property/legitimacy (preventing Replay Attack);
6) if request of data is invalid/and it is illegal, server, which is sent, requests invalid response;If request is effective/legal,
Server returns to the effective response of request;
7) charging unit executes corresponding operating, and returns result to client terminal.
In the step 3) of the above process, the unique SID of client terminal is adopted with request time stamp TS, charge request content CT
With public key KpubEncryption forms level-one ciphertext Kpub(SID, TS, CT), level-one ciphertext Kpub(SID, TS, CT) is whole with client again
Unique SID is held to be spliced to form final ciphertext SID | Kpub(SID, TS, CT).Wherein, client terminal is by plaintext character
After SID, request time stamp TS, charge request content CT are converted to plaintext byte stream, using public key KpubEncryption forms level-one ciphertext
Kpub(SID, TS, CT), as shown in Fig. 5.And in step 5), server splits out final ciphertext SID | Kpub(SID, TS,
CT the SID that is spliced in) simultaneously finds the SID uniquely corresponding private key Kpri, pass through private key KpriDecrypt level-one ciphertext Kpub(SID,
TS, CT) obtain request time stamp TS.Wherein, server will decrypt level-one ciphertext KpubThe plaintext word that (SID, TS, CT) is obtained
After throttling is converted to plaintext character, SID, request time stamp TS, charge request content CT are obtained, as shown in Fig. 5.Server will
The timestamp of its own and request time stamp TS are compared and are judged whether request content legal, upon request between stab and server
The phase difference of the timestamp of itself then judges that request content is legal in the range of threshold value δ allows.
User is securely communicated by the Internet of Things communication module in client terminal with charging unit, can ensure that user believes
The safety of breath, it is ensured that the confidentiality and integrity of entire communication process.Firstly, user opens the Internet of Things Network Communication mould of client terminal
Block (the Internet of Things communication module of client terminal is managed at which to work under the control of device), searches neighbouring charging unit, carries out
(the Internet of Things communication module of charging unit works under the control of its CPU, and CPU can also connect Wi-Fi mould for Internet of Things connection
Block, charging unit and server are connected by HTTPS mode), if successful connection, client terminal, which can obtain, to be filled
The title of electric installation equipment and address can be communicated, as shown in Fig. 6.
In terms of above-mentioned communication authentication method essentially consists in the advantage of safety following four:
1, subscriber authentication
The SID decrypted is compared server with the SID splitted out before, if it does, showing to be transmitted across
Cheng Anquan, ciphertext are not held as a hostage, and are believable.
2, Brute Force is prevented
2048bit RSA is the one kind for the safest cipher mode being currently known, if using the calculating being currently known
Mode, it is impossible to the communication key of client and server is obtained by the way of Brute Force, 2048bit RSA is also army
With a kind of cipher mode common in communication.
3, Replay Attack is prevented
It include current time stamp TS in encrypted fields during link transmission, data are passed by Internet of Things communication module
It is defeated to arrive charging unit, then server is issued after server decryption by charging unit and obtains the timestamp in field, and with itself
Timestamp compares, if the two difference is no more than threshold values δ (δ is determined by network delay and Internet of Things transmission rate), judges
For valid data;It otherwise, is invalid data (attack data).
4, man-in-the-middle attack is prevented
The core of man-in-the-middle attack is to need to establish connection respectively with client and charging unit, and can decrypt after connecting
The communication key of both sides has used RSA public key encryption for such attack, and go-between can not decrypt, altered data, can not
Forged identity, so attack is invalid.
The communication authentication method is that each user generates different public private key pairs in registration phase, even if because pole
Situation is held, the leakage of single user's public key will not influence the communication security of other users.Even if client public key leaks, go-between
Private key (be stored in server-side, and be not handed down to user) can not be obtained, so the server-side that can not also disguise oneself as, steals user's letter
Breath.
In general, in order to guarantee the communication security in charging process, charging unit carry out charging operations when needed for
Communication authentication step are as follows: click client terminal open Internet of Things communication module --- being attached with charging unit --- connect
Charge request --- charging unit is uploaded to user identity and charge request data by network for client terminal initiation after success
--- server carries out authentication --- sending instructions under after success to charging unit ---, and user opens charging operations to server.
From above step as can be seen that can also pass through Internet of Things when user cannot pass through network and communicate with charging unit
Communication module carries out communication and subsequent operation, and process is not only simple, speed is fast, but also safety is stronger, is more advantageous to user
Obtain good experience.The communication authentication method can be successfully applied on the electrically-charging equipment based on cloud platform, can allow new energy
Source user vehicle is securely communicated by Internet of Things communication module and charging unit, charge confirmation and charging operations.
The above embodiments merely illustrate the technical concept and features of the present invention, and its object is to allow person skilled in the art
Scholar cans understand the content of the present invention and implement it accordingly, and it is not intended to limit the scope of the present invention.It is all according to the present invention
Equivalent change or modification made by Spirit Essence, should be covered by the protection scope of the present invention.
Claims (8)
1. a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, it is characterised in that: this method are as follows:
Client terminal is sent at least partly to charging unit by the unique corresponding public key encryption of the client terminal by Internet of Things net mode
Whether final ciphertext, the client terminal are legal by the charge request content that Internet of Things net mode receives the charging unit forwarding
Information, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the charge request content;The charging unit
The final ciphertext is transmitted to the server of its connection, the server by the SID uniquely decrypt by corresponding private key
The final ciphertext simultaneously judges whether the charge request content is legal, and the whether legal information of charge request content is sent
To the charging unit;When the client terminal is to the server registration, by the server, corresponding to generate the client whole
The SID at end, the public key, the private key, the SID of the client terminal, the public key are sent to the visitor by the server
Family terminal, the private key are stored in the server, for communication authentication process use;
The unique SID of client terminal is stabbed with request time, charge request content is close using public key encryption formation level-one
Text, the level-one ciphertext are spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private key of the SID, leads to
Cross the private key and decrypt the level-one ciphertext and obtain the request time stamp, the server by the timestamp of its own with it is described
Request time stamp compares and judges whether the charge request content is legal.
2. it is according to claim 1 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special
Sign is: when the request time is stabbed with the phase difference of the timestamp of the server itself in the range of threshold value δ allows, then
Judge the charge request content legality.
3. it is according to claim 1 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special
Sign is: the SID of plaintext character, request time stamp, the charge request Content Transformation are by the client terminal
After plaintext byte stream, level-one ciphertext is formed using the public key encryption;
The server will be decrypted after the plaintext byte circulation that the level-one ciphertext obtains is changed to plaintext character, obtain the SID,
The request time stamp, the charge request content.
4. a kind of client terminal and charging unit using security mechanism according to any one of claim 1 to 3 is logical
Believe authentication method, it is characterised in that: the Internet of Things net mode is to communicate using any one in NFC, bluetooth, zigbee, 433M
The communication mode of agreement.
5. a kind of using the client terminal of security mechanism and the communication authentication method of charging unit, it is characterised in that: this method are as follows:
Charging unit by Internet of Things net mode receive client terminal send at least partly by the client terminal, uniquely corresponding public key adds
After close final ciphertext, it is transmitted to server, the charging unit is forwarded to the client terminal by institute by Internet of Things net mode
The whether legal information of charge request content that server obtains is stated, to complete communication authentication process;
Wherein, the final ciphertext includes the unique SID of the client terminal and the charge request content;The server is logical
Crossing the SID, uniquely corresponding private key decrypts the final ciphertext and judges whether the charge request content is legal, and will
The whether legal information of charge request content is sent to the charging unit;When the client terminal is to the server registration,
By corresponding SID, the public key, the private key for generating the client terminal of the server, the SID of the client terminal, institute
It states public key and the client terminal is sent to by the server, the private key is stored in the server, for the communication
Verification process uses;
The unique SID of client terminal is stabbed with request time, charge request content is close using public key encryption formation level-one
Text, the level-one ciphertext are spliced to form the final ciphertext with the unique SID of the client terminal again;
The server splits out the SID spliced in the final ciphertext and finds the unique corresponding private key of the SID, leads to
Cross the private key and decrypt the level-one ciphertext and obtain the request time stamp, the server by the timestamp of its own with it is described
Request time stamp compares and judges whether the charge request content is legal.
6. it is according to claim 5 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special
Sign is: when the request time is stabbed with the phase difference of the timestamp of the server itself in the range of threshold value δ allows, then
Judge the charge request content legality.
7. it is according to claim 5 using the client terminal of security mechanism and the communication authentication method of charging unit, it is special
Sign is: the SID of plaintext character, request time stamp, the charge request Content Transformation are by the client terminal
After plaintext byte stream, level-one ciphertext is formed using the public key encryption;
The server will be decrypted after the plaintext byte circulation that the level-one ciphertext obtains is changed to plaintext character, obtain the SID,
The request time stamp, the charge request content.
8. a kind of client terminal and charging unit using security mechanism according to any one of claims 5 to 7 is logical
Believe authentication method, it is characterised in that: the Internet of Things net mode is to communicate using any one in NFC, bluetooth, zigbee, 433M
The communication mode of agreement.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610566212.5A CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610566212.5A CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106209384A CN106209384A (en) | 2016-12-07 |
CN106209384B true CN106209384B (en) | 2019-09-10 |
Family
ID=57493156
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610566212.5A Active CN106209384B (en) | 2016-07-19 | 2016-07-19 | Use the client terminal of security mechanism and the communication authentication method of charging unit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106209384B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108551466A (en) * | 2018-03-14 | 2018-09-18 | 缤刻普锐(北京)科技有限责任公司 | A kind of data processing method and charging unit, data-updating method and system |
CN113497812B (en) * | 2020-03-18 | 2024-08-09 | 瑞昱半导体股份有限公司 | Networking authentication system and method for Internet of things |
CN116345706A (en) * | 2021-12-17 | 2023-06-27 | 中兴通讯股份有限公司 | NFC wireless charging method, system, electronic device and readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
CN102045340A (en) * | 2010-10-15 | 2011-05-04 | 国家电网公司 | Secure data exchange method and system for electric vehicle and charging and exchanging power station |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
CN103929744A (en) * | 2014-04-03 | 2014-07-16 | 东南大学 | Wireless sensor network key management method |
CN104022549A (en) * | 2014-06-08 | 2014-09-03 | 山东天海科技股份有限公司 | Intelligent charging access system for electric automobile |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090217027A1 (en) * | 2008-02-21 | 2009-08-27 | Zenlok Corporation | Safe e-mail for everybody |
-
2016
- 2016-07-19 CN CN201610566212.5A patent/CN106209384B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1790984A (en) * | 2004-12-14 | 2006-06-21 | 中兴通讯股份有限公司 | User identity secret-keeping method in communication system |
CN102045340A (en) * | 2010-10-15 | 2011-05-04 | 国家电网公司 | Secure data exchange method and system for electric vehicle and charging and exchanging power station |
CN103095704A (en) * | 2013-01-15 | 2013-05-08 | 杭州华三通信技术有限公司 | Trusted medium online validation method and device |
CN103929744A (en) * | 2014-04-03 | 2014-07-16 | 东南大学 | Wireless sensor network key management method |
CN104022549A (en) * | 2014-06-08 | 2014-09-03 | 山东天海科技股份有限公司 | Intelligent charging access system for electric automobile |
Also Published As
Publication number | Publication date |
---|---|
CN106209384A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107800539B (en) | Authentication method, authentication device and authentication system | |
JP4002035B2 (en) | A method for transmitting sensitive information using unsecured communications | |
WO2017114123A1 (en) | Key configuration method and key management center, and network element | |
CN105871920A (en) | Communication system and method of terminal and cloud server as well as terminal and cloud server | |
CN105577680A (en) | Key generation method, encrypted data analyzing method, devices and key managing center | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN104253801B (en) | Realize the methods, devices and systems of login authentication | |
CN108964897B (en) | Identity authentication system and method based on group communication | |
CN104683291B (en) | Session key negotiation method based on IMS system | |
CN107733635B (en) | Data security transmission method based on gateway | |
CN108712252B (en) | Symmetric key pool and relay-crossing based AKA identity authentication system and method | |
CN108964896B (en) | Kerberos identity authentication system and method based on group key pool | |
CN103118363A (en) | Method, system, terminal device and platform device of secret information transmission | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN104468126A (en) | Safety communication system and method | |
JP2016519873A (en) | Establishing secure voice communication using a generic bootstrapping architecture | |
CN111970699A (en) | Terminal WIFI login authentication method and system based on IPK | |
Cao et al. | LPPA: Lightweight privacy‐preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks | |
CZ2013373A3 (en) | Authentication method of safe data channel | |
CN106209384B (en) | Use the client terminal of security mechanism and the communication authentication method of charging unit | |
KR102219086B1 (en) | HMAC-based source authentication and secret key sharing method and system for Unnamed Aerial vehicle systems | |
CN102281303A (en) | Data exchange method | |
Leu et al. | Improving security level of LTE authentication and key agreement procedure | |
CN112291196B (en) | End-to-end encryption method and system suitable for instant messaging | |
CN109547303A (en) | Control method and relevant device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |