CN106982191A - Embedded Credential-Security authentication communication mechanism for business WiFi - Google Patents

Embedded Credential-Security authentication communication mechanism for business WiFi Download PDF

Info

Publication number
CN106982191A
CN106982191A CN201610029953.XA CN201610029953A CN106982191A CN 106982191 A CN106982191 A CN 106982191A CN 201610029953 A CN201610029953 A CN 201610029953A CN 106982191 A CN106982191 A CN 106982191A
Authority
CN
China
Prior art keywords
certificate
user
embedded
authentication
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610029953.XA
Other languages
Chinese (zh)
Inventor
梁肇亮
张寿权
王洋
杨勇健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN ZANPU TECHNOLOGY Co Ltd
Original Assignee
TIANJIN ZANPU TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by TIANJIN ZANPU TECHNOLOGY Co Ltd filed Critical TIANJIN ZANPU TECHNOLOGY Co Ltd
Priority to CN201610029953.XA priority Critical patent/CN106982191A/en
Publication of CN106982191A publication Critical patent/CN106982191A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Abstract

The invention belongs to router technology field, more particularly to a kind of embedded Credential-Security authentication communication mechanism for business WiFi, including user, Cloud Server, router;The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment;The Cloud Server includes certificate storage module, route access modules, user's access modules;Router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash.Customer access network in the present invention, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router.

Description

Embedded Credential-Security authentication communication mechanism for business WiFi
Technical field
The invention belongs to router technology field, more particularly, to business WiFi embedded Credential-Security authentication communication mechanism.
Background technology
Almost 100% free WiFi network operator, the problem of all not solving free WiFi system secure accessing currently on the market.Due to free WiFi in order to meet " opening " this business division property, mainly relied on based on the Wi-Fi hotspot of open authentication-exempt, it is authenticated using plaintext Http streams, verification process data will not be encrypted, only by domain name and MAC Address to certificate server and access node apparatus(AP)It is easily recognized, and uses the authentication-exempt WiFi access modules WiFi without cryptoguard.
Current router authentication mechanism uses the WiFi access modules for exempting from cipher authentication, total data is all plaintext transmission, and due to WiFi work characteristics, total data is transmitted in a broadcast mode, others can simply use the network monitoring instrument downloaded from network to get the communication data of whole users, then the parsing of DAS is passed through, closely obtain user's usage behavior and privacy information, handled according to DAS and decryption capabilities even can clearly intercept the important informations such as customer consumption password, its security performance is excessively poor.
The content of the invention
The present invention provides a kind of embedded Credential-Security authentication communication mechanism for business WiFi, to solve router authentication mechanism current in above-mentioned background technology using the WiFi access modules for exempting from cipher authentication, the problem of total data is all plaintext transmission, poor safety performance.
Technical problem solved by the invention is realized using following technical scheme:The present invention provides a kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user, Cloud Server, router;
The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment, the security of equipment can be judged by certificate, user redirects the user to certificate server by 307 messages, transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The Cloud Server includes certificate storage module, route access modules, user's access modules;The certificate storage module has embedded the certificate being mutually matched with router, the route access modules are used for by carrying out credentials match checking to router, prevent false router impersonation Cloud Server, user's access modules are used to the transmission information with user being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The router has embedded the certificate being mutually matched with Cloud Server, it is the Cloud Server that other people forge that Cloud Server can be judged by certificate, false Cloud Server impersonation router is prevented, router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash;The embedded equipment Flash is made up of Uboot subregions, system partitioning, function system subregion, safety certificate subregion, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
Further, the Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides;
Further, the system partitioning is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system;
Further, the function that the function system subregion is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure;
Further, the safety certificate subregion is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
Further, built-in startup mapping process in the Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, safety certificate partition content is loaded into one section of specified memory address position, certification authentication process is given by the specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so as to which whether safely user can see the online environment of oneself.
Further, the BAS64 encryption information and the MAC Address of equipment that will be stored in the Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
Beneficial effects of the present invention are:
1st, router and Cloud Server have been embedded in the certificate being mutually matched by the present invention, it is therefore prevented that malicious attack, the problems such as largely connect, substantially increase overall security.
2nd, customer access network in the present invention, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router.
3rd, user can verify the security of certificate in router or interchanger in the present invention, rather than only the portal page face that is provided by server is provided, it is therefore prevented that focus is cheated using server certificate.
4th, the present invention redirects the user to certificate server by 307 messages, and the certificate that server is provided can be verified out in the browser or client of user, so that whether safely user can see the online environment of oneself.
5th, the transmission information between user of the present invention and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content.
6th, the problems such as Cloud Server of the invention can be verified to router by certificate and prevent malicious attack, largely connect, because certificate blocks the intransitable equipment of checking of a part, is saved greatly the load capacity of equipment today.
7th, " communication encryption based on certificate " based on the insertion digital certificate and compatibility IEEE802.1X standards that the present invention is provided in data communication aspect; the difficulty that the local data that can be increased significantly is monitored, further provides protection in user's access phase to user data.
Brief description of the drawings
Fig. 1 is the embedded Credential-Security authentication communication mechanism structure block diagram of the present invention;
Fig. 2 is the connection figure of the embedded Credential-Security authentication communication mechanism of the present invention;
Fig. 3 is the flow chart of the embedded Credential-Security authentication communication mechanism of the present invention.
Embodiment
The present invention is described further below in conjunction with accompanying drawing:
In figure:1- Cloud Servers, 2- routers, 3- user, 4- handshake modules, 5- safety certificate subregions, 6- function system subregions, 7- system partitionings, 8- user's access modules, 9- Uboot subregions, 10- embedded equipments Flash, 11- authentication module, 12-, proxy authentication module, 13- certification passages, 14- certificate storage modules, 15- route access modules.
Embodiment:
The present embodiment includes:A kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user 3, Cloud Server 1, router 2;
User 3 is used to set up the connected mode shaken hands based on SSL safe socket characters with router 2 by using the embedded certificate of equipment, the security of equipment can be judged by certificate, user 3 is redirected to certificate server by user 3 by 307 messages, transmission information between user 3 and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
Cloud Server 1 includes certificate storage module 14, route access modules 15, user's access modules 8;Certificate storage module 14 has embedded the certificate being mutually matched with router 2, routeing access modules 15 is used for by carrying out credentials match checking to router 2, prevent the false impersonation Cloud Server 1 of router 2, user's access modules 8 are used to the transmission information with user 3 being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
Router 2 has embedded the certificate being mutually matched with Cloud Server 1, it is the Cloud Server 1 that other people forge that Cloud Server 1 can be judged by certificate, the false impersonation router 2 of Cloud Server 1 is prevented, router 2 includes handshake module 4, proxy authentication module 12, certification passage 13, authentication module 11, embedded equipment Flash10;Embedded equipment Flash10 is made up of Uboot subregions 9, system partitioning 7, function system subregion 76, safety certificate subregion 5, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides;
System partitioning 7 is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system;
The function that function system subregion 76 is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure;
Safety certificate subregion 5 is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
Built-in startup mapping process in Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, the content of safety certificate subregion 5 is loaded into one section of specified memory address position, certification authentication process is given by specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, user 3 is redirected to certificate server by 307 messages, the certificate that server is provided can be verified out in the browser or client of user 3, so as to user 3 it can be seen that whether the online environment of oneself is safe.
The BAS64 encryption information and the MAC Address of equipment that will be stored in Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
Operation principle:Customer access network, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by terminal applies;It is each between server and client side to have embedded certificate, and this matches each other to certificate, terminal can be verified to server, server can also be verified to terminal, terminal can judge that server is the server that other people forge by certificate, and server by being verified to terminal the problems such as can prevent malicious attack, largely connect, server impersonation terminal device is prevented, and prevent terminal device impersonation server;Router redirects the user to certificate server by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, judge according to third party's CA certificate issuer with validity period of certificate, by combining existing browser built-in certificate automatic detection mechanism, so that user can directly be seen that whether the online environment of oneself is safe;User is encrypted to the transmission information between server by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, so that the difficulty cracked is greatly increased, so as to ensure the safety of transmission, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content;The connected mode shaken hands based on SSL safe socket characters is provided the user by using the embedded certificate of equipment, accomplishes that every user's independent connection passage and data transfer are encrypted from transmission channel and content aspect, prevents data decryptor between local user.
Beneficial effect:Router and Cloud Server have been embedded in the certificate being mutually matched by the present invention, it is therefore prevented that malicious attack, the problems such as largely connect, substantially increase overall security;Customer access network, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router;User can verify the security of certificate in router or interchanger, rather than only the portal page face that is provided by server is provided, it is therefore prevented that focus is cheated using server certificate;Certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so that whether safely user can see the online environment of oneself;Transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content;The problems such as Cloud Server can be verified to router by certificate and prevent malicious attack, largely connect, because certificate blocks the intransitable equipment of checking of a part, is saved greatly the load capacity of equipment today;" communication encryption based on certificate " based on the insertion digital certificate and compatibility IEEE802.1X standards provided in data communication aspect, the difficulty that the local data that can be increased significantly is monitored further provides protection in user's access phase to user data.
Using technical solutions according to the invention, or those skilled in the art is under the inspiration of technical solution of the present invention, designs similar technical scheme, and reaches above-mentioned technique effect, is to fall into protection scope of the present invention.

Claims (7)

1. a kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user, Cloud Server, router;
The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment, the security of equipment can be judged by certificate, user redirects the user to certificate server by 307 messages, transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The Cloud Server includes certificate storage module, route access modules, user's access modules;The certificate storage module has embedded the certificate being mutually matched with router, the route access modules are used for by carrying out credentials match checking to router, prevent false router impersonation Cloud Server, user's access modules are used to the transmission information with user being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The router has embedded the certificate being mutually matched with Cloud Server, it is the Cloud Server that other people forge that Cloud Server can be judged by certificate, false Cloud Server impersonation router is prevented, router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash;The embedded equipment Flash is made up of Uboot subregions, system partitioning, function system subregion, safety certificate subregion, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
2. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides.
3. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The system partitioning is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system.
4. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The function that the function system subregion is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure.
5. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The safety certificate subregion is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
6. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:Built-in startup mapping process in the Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, safety certificate partition content is loaded into one section of specified memory address position, certification authentication process is given by the specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so as to which whether safely user can see the online environment of oneself.
7. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The BAS64 encryption information and the MAC Address of equipment that will be stored in the Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
CN201610029953.XA 2016-01-18 2016-01-18 Embedded Credential-Security authentication communication mechanism for business WiFi Pending CN106982191A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610029953.XA CN106982191A (en) 2016-01-18 2016-01-18 Embedded Credential-Security authentication communication mechanism for business WiFi

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610029953.XA CN106982191A (en) 2016-01-18 2016-01-18 Embedded Credential-Security authentication communication mechanism for business WiFi

Publications (1)

Publication Number Publication Date
CN106982191A true CN106982191A (en) 2017-07-25

Family

ID=59340255

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610029953.XA Pending CN106982191A (en) 2016-01-18 2016-01-18 Embedded Credential-Security authentication communication mechanism for business WiFi

Country Status (1)

Country Link
CN (1) CN106982191A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110809308A (en) * 2019-09-29 2020-02-18 上海商米科技集团股份有限公司 Method and device for automatically connecting IOT device and WIFI router
CN113114658A (en) * 2021-04-08 2021-07-13 深圳石方数链科技有限公司 Cloud platform host computer-based automatic management system for transmission encrypted certificate

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538706A (en) * 2003-10-23 2004-10-20 港湾网络有限公司 HTTP relocation method for WEB identification
CN102111349A (en) * 2009-12-25 2011-06-29 上海格尔软件股份有限公司 Security certificate gateway
CN103052065A (en) * 2012-12-26 2013-04-17 中兴通讯股份有限公司 Safety verification method and system for wireless network access, and terminal
CN104581725A (en) * 2014-11-28 2015-04-29 广东工业大学 Wi-Fi access dynamic state authentication system and method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1538706A (en) * 2003-10-23 2004-10-20 港湾网络有限公司 HTTP relocation method for WEB identification
CN102111349A (en) * 2009-12-25 2011-06-29 上海格尔软件股份有限公司 Security certificate gateway
CN103052065A (en) * 2012-12-26 2013-04-17 中兴通讯股份有限公司 Safety verification method and system for wireless network access, and terminal
CN104581725A (en) * 2014-11-28 2015-04-29 广东工业大学 Wi-Fi access dynamic state authentication system and method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110809308A (en) * 2019-09-29 2020-02-18 上海商米科技集团股份有限公司 Method and device for automatically connecting IOT device and WIFI router
CN113114658A (en) * 2021-04-08 2021-07-13 深圳石方数链科技有限公司 Cloud platform host computer-based automatic management system for transmission encrypted certificate

Similar Documents

Publication Publication Date Title
CN103763315B (en) A kind of trust data access control method being applied to mobile device cloud storage
JP5860815B2 (en) System and method for enforcing computer policy
CN107018134A (en) A kind of distribution terminal secure accessing platform and its implementation
CN104618108B (en) Safe communication system
CN102546601B (en) The servicing unit of cloud computing terminal for accessing virtual machine
US20090158033A1 (en) Method and apparatus for performing secure communication using one time password
JP2005196776A (en) Safe data communication method and its system between communication terminal and communication equipment
CN111131416B (en) Service providing method and device, storage medium and electronic device
WO2016115807A1 (en) Wireless router access processing method and device, and wireless router access method and device
EP2646942B1 (en) Method for providing a user with an authenticated remote access to a remote secure device
CN105429962B (en) A kind of general go-between service construction method and system towards encryption data
US10045212B2 (en) Method and apparatus for providing provably secure user input/output
CN103973715B (en) Cloud computing security system and method
CN108111497A (en) Video camera and server inter-authentication method and device
CN104243452B (en) A kind of cloud computing access control method and system
CN104168565A (en) Method for controlling safe communication of intelligent terminal under undependable wireless network environment
CN109218334A (en) Data processing method, device, access control equipment, certificate server and system
KR101479290B1 (en) Agent for providing security cloud service, security token device for security cloud service
CN114697963A (en) Terminal identity authentication method and device, computer equipment and storage medium
Ahmad et al. Considerations for mobile authentication in the Cloud
CN113904767A (en) System for establishing communication based on SSL
CN110166471A (en) A kind of portal authentication method and device
CN106982191A (en) Embedded Credential-Security authentication communication mechanism for business WiFi
CN108959908A (en) A kind of method, computer equipment and storage medium that the mobile platform with access SDK is authenticated
CN102594564A (en) Equipment for traffic guidance information security management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170725

WD01 Invention patent application deemed withdrawn after publication