CN106982191A - Embedded Credential-Security authentication communication mechanism for business WiFi - Google Patents
Embedded Credential-Security authentication communication mechanism for business WiFi Download PDFInfo
- Publication number
- CN106982191A CN106982191A CN201610029953.XA CN201610029953A CN106982191A CN 106982191 A CN106982191 A CN 106982191A CN 201610029953 A CN201610029953 A CN 201610029953A CN 106982191 A CN106982191 A CN 106982191A
- Authority
- CN
- China
- Prior art keywords
- certificate
- user
- embedded
- authentication
- router
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Abstract
The invention belongs to router technology field, more particularly to a kind of embedded Credential-Security authentication communication mechanism for business WiFi, including user, Cloud Server, router;The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment;The Cloud Server includes certificate storage module, route access modules, user's access modules;Router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash.Customer access network in the present invention, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router.
Description
Technical field
The invention belongs to router technology field, more particularly, to business WiFi embedded Credential-Security authentication communication mechanism.
Background technology
Almost 100% free WiFi network operator, the problem of all not solving free WiFi system secure accessing currently on the market.Due to free WiFi in order to meet " opening " this business division property, mainly relied on based on the Wi-Fi hotspot of open authentication-exempt, it is authenticated using plaintext Http streams, verification process data will not be encrypted, only by domain name and MAC Address to certificate server and access node apparatus(AP)It is easily recognized, and uses the authentication-exempt WiFi access modules WiFi without cryptoguard.
Current router authentication mechanism uses the WiFi access modules for exempting from cipher authentication, total data is all plaintext transmission, and due to WiFi work characteristics, total data is transmitted in a broadcast mode, others can simply use the network monitoring instrument downloaded from network to get the communication data of whole users, then the parsing of DAS is passed through, closely obtain user's usage behavior and privacy information, handled according to DAS and decryption capabilities even can clearly intercept the important informations such as customer consumption password, its security performance is excessively poor.
The content of the invention
The present invention provides a kind of embedded Credential-Security authentication communication mechanism for business WiFi, to solve router authentication mechanism current in above-mentioned background technology using the WiFi access modules for exempting from cipher authentication, the problem of total data is all plaintext transmission, poor safety performance.
Technical problem solved by the invention is realized using following technical scheme:The present invention provides a kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user, Cloud Server, router;
The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment, the security of equipment can be judged by certificate, user redirects the user to certificate server by 307 messages, transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The Cloud Server includes certificate storage module, route access modules, user's access modules;The certificate storage module has embedded the certificate being mutually matched with router, the route access modules are used for by carrying out credentials match checking to router, prevent false router impersonation Cloud Server, user's access modules are used to the transmission information with user being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The router has embedded the certificate being mutually matched with Cloud Server, it is the Cloud Server that other people forge that Cloud Server can be judged by certificate, false Cloud Server impersonation router is prevented, router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash;The embedded equipment Flash is made up of Uboot subregions, system partitioning, function system subregion, safety certificate subregion, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
Further, the Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides;
Further, the system partitioning is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system;
Further, the function that the function system subregion is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure;
Further, the safety certificate subregion is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
Further, built-in startup mapping process in the Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, safety certificate partition content is loaded into one section of specified memory address position, certification authentication process is given by the specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so as to which whether safely user can see the online environment of oneself.
Further, the BAS64 encryption information and the MAC Address of equipment that will be stored in the Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
Beneficial effects of the present invention are:
1st, router and Cloud Server have been embedded in the certificate being mutually matched by the present invention, it is therefore prevented that malicious attack, the problems such as largely connect, substantially increase overall security.
2nd, customer access network in the present invention, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router.
3rd, user can verify the security of certificate in router or interchanger in the present invention, rather than only the portal page face that is provided by server is provided, it is therefore prevented that focus is cheated using server certificate.
4th, the present invention redirects the user to certificate server by 307 messages, and the certificate that server is provided can be verified out in the browser or client of user, so that whether safely user can see the online environment of oneself.
5th, the transmission information between user of the present invention and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content.
6th, the problems such as Cloud Server of the invention can be verified to router by certificate and prevent malicious attack, largely connect, because certificate blocks the intransitable equipment of checking of a part, is saved greatly the load capacity of equipment today.
7th, " communication encryption based on certificate " based on the insertion digital certificate and compatibility IEEE802.1X standards that the present invention is provided in data communication aspect; the difficulty that the local data that can be increased significantly is monitored, further provides protection in user's access phase to user data.
Brief description of the drawings
Fig. 1 is the embedded Credential-Security authentication communication mechanism structure block diagram of the present invention;
Fig. 2 is the connection figure of the embedded Credential-Security authentication communication mechanism of the present invention;
Fig. 3 is the flow chart of the embedded Credential-Security authentication communication mechanism of the present invention.
Embodiment
The present invention is described further below in conjunction with accompanying drawing:
In figure:1- Cloud Servers, 2- routers, 3- user, 4- handshake modules, 5- safety certificate subregions, 6- function system subregions, 7- system partitionings, 8- user's access modules, 9- Uboot subregions, 10- embedded equipments Flash, 11- authentication module, 12-, proxy authentication module, 13- certification passages, 14- certificate storage modules, 15- route access modules.
Embodiment:
The present embodiment includes:A kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user 3, Cloud Server 1, router 2;
User 3 is used to set up the connected mode shaken hands based on SSL safe socket characters with router 2 by using the embedded certificate of equipment, the security of equipment can be judged by certificate, user 3 is redirected to certificate server by user 3 by 307 messages, transmission information between user 3 and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
Cloud Server 1 includes certificate storage module 14, route access modules 15, user's access modules 8;Certificate storage module 14 has embedded the certificate being mutually matched with router 2, routeing access modules 15 is used for by carrying out credentials match checking to router 2, prevent the false impersonation Cloud Server 1 of router 2, user's access modules 8 are used to the transmission information with user 3 being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
Router 2 has embedded the certificate being mutually matched with Cloud Server 1, it is the Cloud Server 1 that other people forge that Cloud Server 1 can be judged by certificate, the false impersonation router 2 of Cloud Server 1 is prevented, router 2 includes handshake module 4, proxy authentication module 12, certification passage 13, authentication module 11, embedded equipment Flash10;Embedded equipment Flash10 is made up of Uboot subregions 9, system partitioning 7, function system subregion 76, safety certificate subregion 5, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides;
System partitioning 7 is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system;
The function that function system subregion 76 is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure;
Safety certificate subregion 5 is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
Built-in startup mapping process in Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, the content of safety certificate subregion 5 is loaded into one section of specified memory address position, certification authentication process is given by specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, user 3 is redirected to certificate server by 307 messages, the certificate that server is provided can be verified out in the browser or client of user 3, so as to user 3 it can be seen that whether the online environment of oneself is safe.
The BAS64 encryption information and the MAC Address of equipment that will be stored in Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
Operation principle:Customer access network, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by terminal applies;It is each between server and client side to have embedded certificate, and this matches each other to certificate, terminal can be verified to server, server can also be verified to terminal, terminal can judge that server is the server that other people forge by certificate, and server by being verified to terminal the problems such as can prevent malicious attack, largely connect, server impersonation terminal device is prevented, and prevent terminal device impersonation server;Router redirects the user to certificate server by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, judge according to third party's CA certificate issuer with validity period of certificate, by combining existing browser built-in certificate automatic detection mechanism, so that user can directly be seen that whether the online environment of oneself is safe;User is encrypted to the transmission information between server by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, so that the difficulty cracked is greatly increased, so as to ensure the safety of transmission, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content;The connected mode shaken hands based on SSL safe socket characters is provided the user by using the embedded certificate of equipment, accomplishes that every user's independent connection passage and data transfer are encrypted from transmission channel and content aspect, prevents data decryptor between local user.
Beneficial effect:Router and Cloud Server have been embedded in the certificate being mutually matched by the present invention, it is therefore prevented that malicious attack, the problems such as largely connect, substantially increase overall security;Customer access network, need to access route, and when route is accessed, user can judge the security of equipment by certificate, and this judgement can also be completed by client, prevent user from accessing false router;User can verify the security of certificate in router or interchanger, rather than only the portal page face that is provided by server is provided, it is therefore prevented that focus is cheated using server certificate;Certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so that whether safely user can see the online environment of oneself;Transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, it is encrypted using 256 keys, monitoring is not only prevented from approach, is even more thoroughly to prevent monitoring from content;The problems such as Cloud Server can be verified to router by certificate and prevent malicious attack, largely connect, because certificate blocks the intransitable equipment of checking of a part, is saved greatly the load capacity of equipment today;" communication encryption based on certificate " based on the insertion digital certificate and compatibility IEEE802.1X standards provided in data communication aspect, the difficulty that the local data that can be increased significantly is monitored further provides protection in user's access phase to user data.
Using technical solutions according to the invention, or those skilled in the art is under the inspiration of technical solution of the present invention, designs similar technical scheme, and reaches above-mentioned technique effect, is to fall into protection scope of the present invention.
Claims (7)
1. a kind of embedded Credential-Security authentication communication mechanism for business WiFi, it is characterised in that including user, Cloud Server, router;
The user is used to embed the connected mode that certificate is shaken hands with router foundation based on SSL safe socket characters by using equipment, the security of equipment can be judged by certificate, user redirects the user to certificate server by 307 messages, transmission information between user and server is encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The Cloud Server includes certificate storage module, route access modules, user's access modules;The certificate storage module has embedded the certificate being mutually matched with router, the route access modules are used for by carrying out credentials match checking to router, prevent false router impersonation Cloud Server, user's access modules are used to the transmission information with user being encrypted by using based on RSA mechanism and ssl certificate, the page and interface are encrypted by certificate, are encrypted using 256 keys;
The router has embedded the certificate being mutually matched with Cloud Server, it is the Cloud Server that other people forge that Cloud Server can be judged by certificate, false Cloud Server impersonation router is prevented, router includes handshake module, proxy authentication module, certification passage, authentication module, embedded equipment Flash;The embedded equipment Flash is made up of Uboot subregions, system partitioning, function system subregion, safety certificate subregion, for being stored using storage mode fixing address positioning method to the MAC Address of certificate and the equipment, and the partition data is encrypted using BAS64.
2. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The Uboot subregions are used to support the powerful operating system interface function of NFS carries, the root file system of RAMDISK forms, basic miscellaneous function, CRC32 verifications to verify whether intact kernel in FLASH, RAMDISK image files, power-on self-test function SDRAM, FLASH size automatic detection, SDRAM fault detects, specific function XIP boot kernels according to System guides.
3. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The system partitioning is used for the also systematic Core Feature management of the embedded configuration of system, the fault detect of system.
4. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The function that the function system subregion is used for the feature list of system, upgraded according to the demand of system and has cloud backup and cloud to configure.
5. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The safety certificate subregion is used for system and directly embeds ca authentication certificate, HTTPS safe transmission certifications, with reference to existing browser built-in certificate authentication checks, prevent fishing equipment from pretending to be deception, and third party's APP seamless combination interfaces are supported, tripartite APP only needs to that embedded certificate is checked it is prevented that the spoofs services for the AP that goes fishing.
6. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:Built-in startup mapping process in the Uboot subregions, startup mapping process is called by Uboot subregions when equipment starts, safety certificate partition content is loaded into one section of specified memory address position, certification authentication process is given by the specified memory address displacement after system start-up;Certification authentication process submits the machine MAC Address and certificate encrypted partition content by connecting cloud authentication server to server, it is decrypted by cloud authentication server, then corresponding decryption key is returned and gives certification authentication process, certification authentication process is according to secret key pair data deciphering, the device mac address information and local equipment in decrypted result are verified simultaneously, then by ciphertext data to be mapped in the form of virtual file in the catalogue that authentication service is specified, enter normal authentication business flow afterwards, authentication business flow can also be verified to the certificate and device mac address of decryption, certificate server is redirected the user to by 307 messages, the certificate that server is provided can be verified out in the browser or client of user, so as to which whether safely user can see the online environment of oneself.
7. a kind of embedded Credential-Security authentication communication mechanism for business WiFi according to claim 1, it is characterised in that:The BAS64 encryption information and the MAC Address of equipment that will be stored in the Credential-Security subregion, are previously generated, and then information in fixed bit address is directly replaced using chip firing machine.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610029953.XA CN106982191A (en) | 2016-01-18 | 2016-01-18 | Embedded Credential-Security authentication communication mechanism for business WiFi |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610029953.XA CN106982191A (en) | 2016-01-18 | 2016-01-18 | Embedded Credential-Security authentication communication mechanism for business WiFi |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106982191A true CN106982191A (en) | 2017-07-25 |
Family
ID=59340255
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610029953.XA Pending CN106982191A (en) | 2016-01-18 | 2016-01-18 | Embedded Credential-Security authentication communication mechanism for business WiFi |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106982191A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110809308A (en) * | 2019-09-29 | 2020-02-18 | 上海商米科技集团股份有限公司 | Method and device for automatically connecting IOT device and WIFI router |
CN113114658A (en) * | 2021-04-08 | 2021-07-13 | 深圳石方数链科技有限公司 | Cloud platform host computer-based automatic management system for transmission encrypted certificate |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1538706A (en) * | 2003-10-23 | 2004-10-20 | 港湾网络有限公司 | HTTP relocation method for WEB identification |
CN102111349A (en) * | 2009-12-25 | 2011-06-29 | 上海格尔软件股份有限公司 | Security certificate gateway |
CN103052065A (en) * | 2012-12-26 | 2013-04-17 | 中兴通讯股份有限公司 | Safety verification method and system for wireless network access, and terminal |
CN104581725A (en) * | 2014-11-28 | 2015-04-29 | 广东工业大学 | Wi-Fi access dynamic state authentication system and method |
-
2016
- 2016-01-18 CN CN201610029953.XA patent/CN106982191A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1538706A (en) * | 2003-10-23 | 2004-10-20 | 港湾网络有限公司 | HTTP relocation method for WEB identification |
CN102111349A (en) * | 2009-12-25 | 2011-06-29 | 上海格尔软件股份有限公司 | Security certificate gateway |
CN103052065A (en) * | 2012-12-26 | 2013-04-17 | 中兴通讯股份有限公司 | Safety verification method and system for wireless network access, and terminal |
CN104581725A (en) * | 2014-11-28 | 2015-04-29 | 广东工业大学 | Wi-Fi access dynamic state authentication system and method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110809308A (en) * | 2019-09-29 | 2020-02-18 | 上海商米科技集团股份有限公司 | Method and device for automatically connecting IOT device and WIFI router |
CN113114658A (en) * | 2021-04-08 | 2021-07-13 | 深圳石方数链科技有限公司 | Cloud platform host computer-based automatic management system for transmission encrypted certificate |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103763315B (en) | A kind of trust data access control method being applied to mobile device cloud storage | |
JP5860815B2 (en) | System and method for enforcing computer policy | |
CN107018134A (en) | A kind of distribution terminal secure accessing platform and its implementation | |
CN104618108B (en) | Safe communication system | |
CN102546601B (en) | The servicing unit of cloud computing terminal for accessing virtual machine | |
US20090158033A1 (en) | Method and apparatus for performing secure communication using one time password | |
JP2005196776A (en) | Safe data communication method and its system between communication terminal and communication equipment | |
CN111131416B (en) | Service providing method and device, storage medium and electronic device | |
WO2016115807A1 (en) | Wireless router access processing method and device, and wireless router access method and device | |
EP2646942B1 (en) | Method for providing a user with an authenticated remote access to a remote secure device | |
CN105429962B (en) | A kind of general go-between service construction method and system towards encryption data | |
US10045212B2 (en) | Method and apparatus for providing provably secure user input/output | |
CN103973715B (en) | Cloud computing security system and method | |
CN108111497A (en) | Video camera and server inter-authentication method and device | |
CN104243452B (en) | A kind of cloud computing access control method and system | |
CN104168565A (en) | Method for controlling safe communication of intelligent terminal under undependable wireless network environment | |
CN109218334A (en) | Data processing method, device, access control equipment, certificate server and system | |
KR101479290B1 (en) | Agent for providing security cloud service, security token device for security cloud service | |
CN114697963A (en) | Terminal identity authentication method and device, computer equipment and storage medium | |
Ahmad et al. | Considerations for mobile authentication in the Cloud | |
CN113904767A (en) | System for establishing communication based on SSL | |
CN110166471A (en) | A kind of portal authentication method and device | |
CN106982191A (en) | Embedded Credential-Security authentication communication mechanism for business WiFi | |
CN108959908A (en) | A kind of method, computer equipment and storage medium that the mobile platform with access SDK is authenticated | |
CN102594564A (en) | Equipment for traffic guidance information security management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170725 |
|
WD01 | Invention patent application deemed withdrawn after publication |