CN107104952A - A kind of smart home user anthority identifying method, user terminal and central control equipment - Google Patents
A kind of smart home user anthority identifying method, user terminal and central control equipment Download PDFInfo
- Publication number
- CN107104952A CN107104952A CN201710213178.8A CN201710213178A CN107104952A CN 107104952 A CN107104952 A CN 107104952A CN 201710213178 A CN201710213178 A CN 201710213178A CN 107104952 A CN107104952 A CN 107104952A
- Authority
- CN
- China
- Prior art keywords
- authentication
- public key
- user terminal
- private key
- different
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
- H04L63/0846—Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Lock And Its Accessories (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application discloses a kind of smart home user anthority identifying method, user terminal and central control equipment, this method includes:Authentication request is initiated to intelligent domestic system;Positive authentication public key corresponding with current time is determined, the first public key is obtained;The first public key is sent to intelligent domestic system;Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges whether the first public key matches with the first private key, if it is, by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal;Also, information at the time of different positive authentication public keys corresponds to different, information at the time of different positive authentication private keys corresponds to different.The security of smart home subscription authentication process can be substantially improved in the application, fully maintain the person and property safety of user.
Description
Technical field
The present invention relates to Smart Home technical field, more particularly to a kind of smart home user anthority identifying method, user terminal
And central control equipment.
Background technology
Currently, with the fast development of technology of Internet of things, smart home technology is flourished, increasing family
Occupy equipment to add in intelligent domestic system, user just can be carried out the intelligent home device of family by the user terminal in hand
Remote control, greatly improves the intelligent level of house system.
, it is necessary to intelligent domestic system before user attempts to carry out remote control by user's terminal-pair intelligent home device
Authentication operations first are carried out to user terminal, only after authentication passes through, user terminal can be allowed to enter intelligent home device
Row remote control.
Current intelligent domestic system, when carrying out authentication operations to user terminal, is based on one set in advance fixed peace
Omnicharacteristic value (such as password) user terminal is deployed to authenticate, when intelligent domestic system judges the safety of user terminal transmission
Characteristic value is consistent with default legal characteristic value, then can then be allowed by user terminal by the authentication to user terminal
Intelligent home device is controlled.
However, because the Special safety value indicative needed for above-mentioned authentication process is default fixed value, it is easy at illegal point
It is compromised in the case of sub- malicious intrusions, so that criminal can be reached pair using the security feature value got
Intelligent home device carries out the purpose of malice control, it is easy to cause the great person and property loss to user.
In summary as can be seen that the security for how lifting smart home subscription authentication process is urgently to be resolved hurrily at present
Problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of smart home user anthority identifying method, user terminal and center
Control device, improves the security of smart home subscription authentication process.Its concrete scheme is as follows:
A kind of smart home user anthority identifying method, it is adaptable to user terminal, including:
Authentication request is initiated to intelligent domestic system;
Positive authentication public key corresponding with current time is determined, the first public key is obtained;
First public key is sent to the intelligent domestic system;
Wherein, when the intelligent domestic system receives first public key, then the intelligent domestic system will perform with
Lower step:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judge first public key and institute
State whether the first private key matches, if it is, by the authentication to the user terminal, if it is not, then no thoroughfare to described
The authentication of user terminal;Also, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys
Corresponding to it is different at the time of information.
Optionally, the smart home user anthority identifying method, in addition to:
Obtain the second public key that the intelligent domestic system is sent;Wherein, second public key is the smart home system
The reverse authentication public key corresponding with current time that system is determined after by the authentication to the user terminal;
Determine reverse authentication private key corresponding with current time, obtain the second private key, and judge second public key with
Whether second private key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare
To the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
Optionally, it is described to determine positive authentication public key corresponding with current time, the process of the first public key is obtained, is wrapped
Include:
The time slice residing for current time is determined, is then reflected using be pre-stored on the user terminal first
File is penetrated, positive authentication public key corresponding with the time slice is determined, obtains first public key;
It is described to determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, including:
The time slice residing for current time is determined, then using first mapped file, is determined and the time
The corresponding reverse authentication private key of fragment, obtains second private key;
Wherein, first mapped file is to distinguish one-to-one to each time slice and with each time slice
Forward direction authentication public key and reverse authentication private key carry out the mapped file of record preservation.
The invention also discloses another smart home user anthority identifying method, it is adaptable to intelligent domestic system, including:
Receive the first public key that user terminal is sent;Wherein, first public key is that the user terminal is initiating to authenticate
The positive authentication public key corresponding with current time determined after request;
Positive authentication private key corresponding with current time is determined, the first private key is obtained;
Judge whether first public key matches with first private key, if it is, by the user terminal
Authentication, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Optionally, after the process of the authentication by the user terminal, in addition to:
Reverse authentication public key corresponding with current time is determined, the second public key is obtained, and send to the user terminal
Second public key;Wherein, when the user terminal receives second public key, the user terminal will perform following walk
Suddenly:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and judges second public key and described the
Whether two private keys match, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to described
The authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
Optionally, it is described to determine positive authentication private key corresponding with current time, the process of the first private key is obtained, is wrapped
Include:
The time slice residing for current time is determined, be pre-stored on the intelligent domestic system is then utilized
Two mapped files, determine positive authentication private key corresponding with the time slice, obtain first private key;
It is described to determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, including:
The time slice residing for current time is determined, then using second mapped file, is determined and the time
The corresponding reverse authentication public key of fragment, obtains second public key;
Wherein, second mapped file is to distinguish one-to-one to each time slice and with each time slice
Forward direction authentication private key and reverse authentication public key carry out the mapped file of record preservation.
Optionally, the smart home user anthority identifying method, in addition to:
When the intelligent domestic system is by the authentication to the user terminal, then allow the user terminal to the intelligence
Intelligent home device in energy house system is controlled.
Optionally, the smart home user anthority identifying method, in addition to:
When the intelligent domestic system is passed through to described by the authentication to the user terminal, and the user terminal
The authentication of intelligent domestic system, then allow the user terminal to control the intelligent home device in the intelligent domestic system
System.
The present invention accordingly discloses a kind of user terminal, including:
Initiation module is asked, for initiating authentication request;
Public key determining module, for initiating authentication request when the request initiation module, it is determined that go out and current time pair
The positive authentication public key answered, obtains the first public key;
Public key sending module, for sending first public key to intelligent domestic system;Wherein, when the smart home system
System receives first public key, and following steps will be executed for the intelligent domestic system:Determine it is corresponding with current time just
To authentication private key, the first private key is obtained, and judges whether first public key matches with first private key, if it is, logical
The authentication to the user terminal is crossed, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Optionally, the user terminal, in addition to:
Public key receiving module, for receiving the second public key that the intelligent domestic system is sent;Wherein, second public key
Pass through the reverse mirror corresponding with current time determined after the authentication to the user terminal for the intelligent domestic system
Weigh public key;
Private key determining module, for receiving second public key when the public key receiving module, it is determined that go out with currently
Moment corresponding reverse authentication private key, obtains the second private key;
Control module is authenticated, for judging whether second public key matches with second private key, if it is, passing through
To the authentication of the intelligent domestic system, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
The present invention further correspondingly discloses a kind of smart home central control equipment, including:
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, first public key is used to be described
The positive authentication public key corresponding with current time that family terminal is determined after authentication request is initiated;
Private key determining module, for receiving first public key when the public key receiving module, it is determined that go out with currently
Moment corresponding positive authentication private key, obtains the first private key;
Control module is authenticated, for judging whether first public key matches with first private key, if it is, passing through
To the authentication of the user terminal, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Optionally, the smart home central control equipment, in addition to:
Public key determining module, after in the authentication control module by the authentication to the user terminal, it is determined that
Go out reverse authentication public key corresponding with current time, obtain the second public key;
Public key sending module, for sending second public key to the user terminal;Wherein, when the user terminal connects
Second public key is received, following steps will be executed for the user terminal:Determine that reverse authentication corresponding with current time is private
Key, obtains the second private key, and judges whether second public key matches with second private key, if it is, by described
The authentication of intelligent domestic system, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
In the present invention, smart home user anthority identifying method, it is adaptable to user terminal, including:Initiated to intelligent domestic system
Authentication request;Positive authentication public key corresponding with current time is determined, the first public key is obtained;The is sent to intelligent domestic system
One public key;Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine
Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as
Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal;Also, different forward directions
Authenticate information at the time of public key corresponds to different, information at the time of different positive authentication private keys corresponds to different.
It can be seen that, information at the time of different positive authentication public keys and positive authentication private key both correspond to different in the present invention,
That is, the positive authentication public key and positive authentication private key in the present invention are not changeless, but can be over time
Elapse and occur dynamic change, relative to the technical scheme authenticated in the prior art based on fixed security feature value, sheet
The security of smart home subscription authentication process obviously can be substantially improved in invention, fully maintain the person and property of user
Safety.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of smart home user anthority identifying method timing diagram disclosed in the embodiment of the present invention;
Fig. 2 is a kind of specific smart home user anthority identifying method timing diagram disclosed in the embodiment of the present invention;
Fig. 3 is a kind of user terminal application schematic diagram disclosed in the embodiment of the present invention;
Fig. 4 is another user terminal application schematic diagram disclosed in the embodiment of the present invention;
Fig. 5 is a kind of user terminal hardware structural representation disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of smart home user anthority identifying method, it is adaptable to which user terminal, Fig. 1 is this implementation
The corresponding timing diagram of this method in example, wherein, this method includes below step S11 to S13:
Step S11:Authentication request is initiated to intelligent domestic system.
Step S12:Positive authentication public key corresponding with current time is determined, the first public key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different.Specifically, corresponding under at the time of different
Positive authentication public key differ;Or, the positive authentication public key corresponding to different time slices is differed, this feelings
Under condition, if wanting to determine positive authentication public key corresponding with current time, need first to determine the time residing for current time
Fragment, then determines corresponding positive authentication public key according to the time slice.It is understood that above-mentioned different timeslice
Time span corresponding to section can be with identical, naturally it is also possible to inequality.
It should be noted that the positive authentication public key in the present invention refers to that intelligent domestic system reflects to user terminal
Public key needed for during power.
In the embodiment of the present invention, the intelligent home device of intelligent domestic system includes but is not limited to intelligent television, intelligent ice
Case, intelligent washing machine, intelligent lamp and intelligent air condition etc..
It is understood that, it is necessary to first to all in intelligent domestic system before user terminal initiates authentication request
Equipment carries out validation verification, specifically, it is possible to use control key (CK-Control keys) and Hash hardware controls key
(HCK-HASH/Hardware CK) to carry out validation verification to all devices in intelligent domestic system.
Step S13:The first public key is sent to intelligent domestic system.
Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine
Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as
Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal.
Wherein, information at the time of different positive authentication private keys corresponds to different.Specifically, corresponding under at the time of different
Positive authentication private key differ;Or, the positive authentication private key corresponding to different time slices is differed.
It should be noted that the positive authentication private key in the present invention refers to that intelligent domestic system reflects to user terminal
Private key needed for during power.
In the present embodiment, intelligent domestic system judges that the first public key can include with the process whether the first private key matches:
Utilize matching somebody with somebody between the legal positive authentication public key got obtain in real time or prior and legal positive authentication private key
To information, to judge whether matched between the first public key and the first private key.In the present embodiment, different legal positive authentication public keys
Match from different legal positive authentication private keys.When the unpaired message between the first public key and the first private key is legal pairing
Information, then can determine that the first public key and the first private key match, otherwise, it is determined that the first public key and the first private key are mismatched.
Further, the smart home user anthority identifying method in the embodiment of the present invention, can also include:When smart home system
System then allows user terminal to be controlled the intelligent home device in intelligent domestic system by the authentication to user terminal.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention
Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can
Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value
The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain
The person and property safety of user.
The embodiment of the invention discloses a kind of specific smart home user anthority identifying method, it is adaptable to user terminal, and Fig. 2 is
The corresponding timing diagram of this method, this method specifically includes below step S21 to S28:
Step S21:Authentication request is initiated to intelligent domestic system.
Step S22:Positive authentication public key corresponding with current time is determined, the first public key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different.
Specifically, above-mentioned determine positive authentication public key corresponding with current time, the process of the first public key is obtained, is wrapped
Include:The time slice residing for current time is determined, then using the first mapped file pre-saved on the subscriber terminal, really
Positive authentication public key corresponding with the time slice is made, the first public key is obtained.
In the present embodiment, above-mentioned first mapped file is to distinguish one by one to each time slice and with each time slice
Corresponding positive authentication public key and reverse authentication private key carry out the mapped file of record preservation.It should be noted that in the present invention
Positive authentication public key refer to intelligent domestic system public key required during being authenticated to user terminal, reverse authentication
Private key refers to user terminal private key required during being authenticated to intelligent domestic system.
That is, continuous N number of time slice, and record successively in time can be recorded in above-mentioned first mapped file
One-to-one N number of forward direction authenticates public key respectively with above-mentioned N number of time slice, is also recorded in addition and above-mentioned N number of time slice
The one-to-one N number of reverse authentication private key of difference.It is understood that different time fragment in above-mentioned N number of time slice
Time span can be identical, certainly, in order to further lift the different time piece in security, above-mentioned N number of time slice
The time span of section can also be differed, that is, the different time fragment in above-mentioned N number of time slice can in time span
With having differences property, and above-mentioned otherness preferentially can be designed to irregular otherness.
In the present embodiment, it is assumed that user terminal initiates authentication request under the A moment, then when user terminal will determine A
Residing time slice is carved, and then determines that positive authentication corresponding with the time slice is public using above-mentioned first mapped file
Key.After this, if user terminal is inscribed in B and initiates authentication request, user will determine residing for the B moment when
Between fragment, it is to be understood that if time slice residing for the A moment is same timeslice with the time slice residing for the B moment
Section, then the positive authentication public key corresponding to the B moment is identical with the positive authentication public key corresponding to the A moment, if residing for the A moment
Time slice and the not same time slice of time slice residing for the B moment, then the positive authentication public key corresponding to the B moment is different
In the positive authentication public key corresponding to the A moment.
In the present embodiment, user terminal can obtain above-mentioned first mapping by the preassigned webserver in advance
File, and the first mapped file that the webserver is sent to user terminal then can come from preassigned security server.
It is understood that the safe security in the webserver of security server.Secondly, preserved in security server
Each forward direction authentication public key and reverse authentication private key can utilize HSM (i.e. Hardware Security Module, hardware peace
Full module) generate.
It is understood that in the present embodiment, before user terminal initiates authentication request, user terminal need in advance from
Above-mentioned first mapped file is obtained in the above-mentioned webserver.
Step S23:The first public key is sent to intelligent domestic system.
Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine
Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as
Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal.
Wherein, information at the time of different positive authentication private keys corresponds to different.
Specifically, above-mentioned determine positive authentication private key corresponding with current time, the process of the first private key is obtained, is wrapped
Include:The time slice residing for current time is determined, the second mapping text being pre-stored on intelligent domestic system is then utilized
Part, determines positive authentication private key corresponding with the time slice, obtains the first private key.
In the present embodiment, the second mapped file is to be corresponded respectively to each time slice and with each time slice
Positive authentication private key and reverse authentication public key carry out the mapped file of record preservation.
In order to improve security, above-mentioned intelligent domestic system preferentially obtains above-mentioned second mapping from above-mentioned security server
File.In addition, each forward direction authentication private key and reverse authentication public key for being preserved in security server can utilize HSM next life
Into.
It is understood that in the present embodiment, before user terminal initiates authentication request, intelligent domestic system needs pre-
Above-mentioned second mapped file is first obtained from above-mentioned security server.
In addition, in the present embodiment, time slice information in above-mentioned first mapped file with the second mapped file when
Between piece segment information be identical.Further, when the time slice information in above-mentioned first mapped file and the second mapped file
After changing, for the sake of security, validation verification can be carried out to all devices in intelligent domestic system again, specifically
, it is possible to use control key and Hash hardware controls key are tested to carry out validity to all devices in intelligent domestic system
Card.
It should be noted that the positive authentication private key in the present invention refers to that intelligent domestic system reflects to user terminal
Private key needed for during power, reverse authentication public key refers to user terminal during being authenticated to intelligent domestic system
Required public key.
Step S24:Obtain the second public key that intelligent domestic system is sent;Wherein, the second public key is that intelligent domestic system exists
By determining reverse authentication public key corresponding with current time after the authentication to user terminal.
Wherein, information at the time of different reverse authentication public keys corresponds to different.
In the present embodiment, intelligent domestic system determines the process of above-mentioned second public key, specifically includes:When determining current
Residing time slice is carved, then using above-mentioned second mapped file, determines that reverse authentication corresponding with the time slice is public
Key, obtains the second public key.
Step S25:Reverse authentication private key corresponding with current time is determined, the second private key is obtained.
Wherein, different reverse authentication private key correspondences from it is different at the time of information.
Specifically, above-mentioned determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, can be with
Including:The time slice residing for current time is determined, then using above-mentioned first mapped file, is determined and the time slice
Corresponding reverse authentication private key, obtains the second private key.
Step S26:Judge whether the second public key matches with the second private key, if it is, into step S27, if it is not, then
Into step S28.
In the present embodiment, user terminal judges that the second public key can include with the process whether the second private key matches:Utilize
Pairing letter obtain in real time or between the prior legal reverse authentication public key got and legal reverse authentication private key
Breath, to judge whether matched between the second public key and the second private key.
Step S27:Pass through the authentication to intelligent domestic system.
Step S28:No thoroughfare to the authentication of intelligent domestic system.
In the present embodiment, when intelligent domestic system is passed through to intelligence by the authentication to user terminal, and user terminal
The authentication of house system, then can allow user terminal to be controlled the intelligent home device in intelligent domestic system, otherwise
User terminal is forbidden to be controlled intelligent home device.That is, the embodiment of the present invention needs the feelings passed through in bi-directional authentification
Under condition, user terminal can be allowed to be controlled intelligent home device, this passes through to user relative to when intelligent domestic system
The authentication of terminal just allows to obtain stronger guarantor in terms of the situation that user terminal is controlled intelligent home device, security
Barrier.
Shown in Figure 1, the embodiment of the invention discloses another smart home user anthority identifying method, it is adaptable to intelligent family
System is occupied, this method includes below step S31 to S35:
Step S31:Receive the first public key that user terminal is sent;Wherein, the first public key is that user terminal is initiating to authenticate
The positive authentication public key corresponding with current time determined after request.
Step S32:Positive authentication private key corresponding with current time is determined, the first private key is obtained.
Step S33:Judge whether the first public key matches with the first private key, if it is, into step S34, if it is not, then
Into step S35.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Step S34:Pass through the authentication to user terminal.
Step S35:No thoroughfare to the authentication of user terminal.
, can be in the case where intelligent domestic system be by the authentication to user terminal in the present embodiment, it is allowed to which user is whole
End is controlled to the intelligent home device in intelligent domestic system.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention
Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can
Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value
The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain
The person and property safety of user.
Shown in Figure 2, the embodiment of the invention discloses a kind of specific smart home user anthority identifying method, it is adaptable to intelligence
Energy house system, this method includes below step S41 to 47:
Step S41:Receive the first public key that user terminal is sent;Wherein, the first public key is that user terminal is initiating to authenticate
The positive authentication public key corresponding with current time determined after request.
Specifically, the above-mentioned process for determining the first public key, including:The time slice residing for current time is determined, so
Afterwards using the first mapped file pre-saved on the subscriber terminal, determine that positive authentication corresponding with the time slice is public
Key, obtains the first public key.
In the present embodiment, above-mentioned first mapped file is to distinguish one by one to each time slice and with each time slice
Corresponding positive authentication public key and reverse authentication private key carry out the mapped file of record preservation.
Step S42:Positive authentication private key corresponding with current time is determined, the first private key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Specifically, the above-mentioned process for determining the first private key, including:The time slice residing for current time is determined, so
Afterwards using the second mapped file being pre-stored on intelligent domestic system, positive authentication corresponding with the time slice is determined
Private key, obtains the first private key.
Wherein, the second mapped file is to each time slice and one-to-one positive respectively with each time slice
Authenticate private key and reverse authentication public key carries out the mapped file of record preservation.
Step S43:Judge whether the first public key matches with the first private key, if it is, into step S44, if it is not, then
Into step S45.
Step S44:By the authentication to user terminal, subsequently into step S46.
Step S45:No thoroughfare to the authentication of user terminal.
Step S46:Reverse authentication public key corresponding with current time is determined, the second public key is obtained.
Specifically, above-mentioned determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, can be with
Including:The time slice residing for current time is determined, then using above-mentioned second mapped file, is determined and the time slice
Corresponding reverse authentication public key, obtains the second public key.
Step S47:The second public key is sent to user terminal;Wherein, when user terminal receives the second public key, user terminal
Following steps will be executed:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and judge the second public key
Whether matched with the second private key, if it is, by the authentication to intelligent domestic system, if it is not, then no thoroughfare to intelligence
The authentication of house system;
In the present embodiment, the determination process of above-mentioned second private key can specifically include:Determine residing for current time when
Between fragment, then using above-mentioned first mapped file, determine reverse authentication private key corresponding with the time slice, obtain second
Private key.
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
In the present embodiment, when intelligent domestic system is passed through to intelligence by the authentication to user terminal, and user terminal
The authentication of house system, then can allow user terminal to be controlled the intelligent home device in intelligent domestic system.
The present invention further correspondingly discloses a kind of user terminal, shown in Figure 3, and the user terminal includes:
Initiation module 11 is asked, for initiating authentication request;
Public key determining module 12, for initiating authentication request when request initiation module 11, it is determined that go out and current time pair
The positive authentication public key answered, obtains the first public key;
Public key sending module 13, for sending the first public key to intelligent domestic system;Wherein, when intelligent domestic system is received
To the first public key, following steps will be executed for intelligent domestic system:Positive authentication private key corresponding with current time is determined, is obtained
First private key, and judge whether the first public key matches with the first private key, if it is, by the authentication to user terminal, if
No, then no thoroughfare to the authentication of user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention
Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can
Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value
The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain
The person and property safety of user.
Further, shown in Figure 4, the user terminal in the present embodiment can also include:
Public key receiving module 14, the second public key for receiving intelligent domestic system transmission;Wherein, the second public key is intelligence
House system is by determining reverse authentication public key corresponding with current time after the authentication to user terminal;
Private key determining module 15, for receiving the second public key when public key receiving module 14, it is determined that go out and current time
Corresponding reverse authentication private key, obtains the second private key;
Control module 16 is authenticated, for judging whether the second public key matches with the second private key, if it is, by intelligence
The authentication of house system, if it is not, then no thoroughfare to the authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
The embodiment of the present invention further discloses a kind of smart home central control equipment, including public key receiving module,
Private key determining module and authentication control module;Wherein,
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, the first public key is that user terminal exists
Initiate the positive authentication public key corresponding with current time determined after authentication request;
Private key determining module, for receiving the first public key when public key receiving module, it is determined that go out corresponding with current time
Positive authentication private key, obtain the first private key;
Control module is authenticated, for judging whether the first public key matches with the first private key, if it is, by whole to user
The authentication at end, if it is not, then no thoroughfare to the authentication of user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention
Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can
Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value
The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain
The person and property safety of user.
Further, the smart home central control equipment in the present embodiment, can also include public key determining module and public affairs
Key sending module;Wherein,
Public key determining module, for after control module is authenticated by the authentication to user terminal, determining and currently
Moment corresponding reverse authentication public key, obtains the second public key;
Public key sending module, for sending the second public key to user terminal;Wherein, when user terminal receives the second public affairs
Key, following steps will be executed for user terminal:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and
Judge whether the second public key matches with the second private key, if it is, by the authentication to intelligent domestic system, if it is not, then prohibiting
Only pass through the authentication to intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with
Information at the time of different.
Shown in Figure 5 the embodiment of the invention also discloses a kind of user terminal, the user terminal includes the He of processor 21
Memory 22;Wherein, processor 21 performs following steps by transferring the instruction stored in memory 22:
Authentication request is initiated, it is then determined that going out positive authentication public key corresponding with current time, the first public key is obtained, then
The first public key is sent to intelligent domestic system;Wherein, when intelligent domestic system receives the first public key, intelligent domestic system will be held
Row following steps:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges the first public key and the
Whether one private key matches, if it is, by the authentication to user terminal, if it is not, then no thoroughfare to the mirror of user terminal
Power.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to
Information at the time of different.
Further, in the embodiment of the present invention, above-mentioned processor 21 can also be by transferring the finger stored in memory 22
Make performing following steps:The second public key that intelligent domestic system is sent is received, it is then determined that going out corresponding with current time anti-
To authentication private key, the second private key is obtained, then judges whether the second public key matches with the second private key, if it is, by intelligence
Can house system authentication, if it is not, then no thoroughfare to the authentication of intelligent domestic system;Wherein, the second public key is intelligent family
System is occupied by determining reverse authentication public key corresponding with current time after the authentication to user terminal, different is reverse
Authenticate information at the time of public key corresponds to different, different reverse authentication private key correspondences from it is different at the time of information.
It is understood that the user terminal in the present embodiment still further comprises battery 23, communication chip 24, display screen
25th, output device 26 and input unit 27.
It is understood that processor in the present embodiment, memory, battery, communication chip, display screen, output device and
The quantity of input unit may each be odd number or a plurality of, they not limited one by one herein.In addition, this
The operating system of user terminal can include one or more of existing all main flow terminal operating systems in embodiment, also may be used
So that including following operating system newly developed, the operating system of user terminal is specifically limited in this is not to the present embodiment.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by
One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation
Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning
Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that
A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or
The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged
Except also there is other identical element in the process including the key element, method, article or equipment.
A kind of smart home user anthority identifying method provided by the present invention, user terminal and central control equipment are entered above
Go and be discussed in detail, specific case used herein is set forth to the principle and embodiment of the present invention, and the above is implemented
The explanation of example is only intended to the method and its core concept for helping to understand the present invention;Simultaneously for the general technology people of this area
Member, according to the thought of the present invention, will change in specific embodiments and applications, in summary, this explanation
Book content should not be construed as limiting the invention.
Claims (12)
1. a kind of smart home user anthority identifying method, it is adaptable to user terminal, it is characterised in that including:
Authentication request is initiated to intelligent domestic system;
Positive authentication public key corresponding with current time is determined, the first public key is obtained;
First public key is sent to the intelligent domestic system;
Wherein, when the intelligent domestic system receives first public key, then the intelligent domestic system will perform following walk
Suddenly:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges first public key and described the
Whether one private key matches, if it is, by the authentication to the user terminal, if it is not, then no thoroughfare to the user
The authentication of terminal;Also, information at the time of different positive authentication public keys corresponds to different, different positive authentication private key correspondences
The information in different at the time of.
2. smart home user anthority identifying method according to claim 1, it is characterised in that also include:
Obtain the second public key that the intelligent domestic system is sent;Wherein, second public key is that the intelligent domestic system exists
Pass through the reverse authentication public key corresponding with current time determined after the authentication to the user terminal;
Determine reverse authentication private key corresponding with current time, obtain the second private key, and judge second public key with it is described
Whether the second private key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to institute
State the authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different
At the time of information.
3. smart home user anthority identifying method according to claim 2, it is characterised in that
It is described to determine positive authentication public key corresponding with current time, the process of the first public key is obtained, including:
The time slice residing for current time is determined, the first mapping text being pre-stored on the user terminal is then utilized
Part, determines positive authentication public key corresponding with the time slice, obtains first public key;
It is described to determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, including:
The time slice residing for current time is determined, then using first mapped file, is determined and the time slice
Corresponding reverse authentication private key, obtains second private key;
Wherein, first mapped file is to each time slice and one-to-one positive respectively with each time slice
Authenticate public key and reverse authentication private key carries out the mapped file of record preservation.
4. a kind of smart home user anthority identifying method, it is adaptable to intelligent domestic system, it is characterised in that including:
Receive the first public key that user terminal is sent;Wherein, first public key is that the user terminal is initiating authentication request
The positive authentication public key corresponding with current time determined afterwards;
Positive authentication private key corresponding with current time is determined, the first private key is obtained;
Judge whether first public key matches with first private key, if it is, by the authentication to the user terminal,
If it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference
At the time of information.
5. smart home user anthority identifying method according to claim 4, it is characterised in that described by whole to the user
After the process of the authentication at end, in addition to:
Reverse authentication public key corresponding with current time is determined, the second public key is obtained, and send described to the user terminal
Second public key;Wherein, when the user terminal receives second public key, following steps will be executed for the user terminal:Really
Reverse authentication private key corresponding with current time is made, the second private key is obtained, and judge that second public key is private with described second
Whether key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to the intelligence
The authentication of house system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different
At the time of information.
6. smart home user anthority identifying method according to claim 5, it is characterised in that
It is described to determine positive authentication private key corresponding with current time, the process of the first private key is obtained, including:
The time slice residing for current time is determined, is then reflected using be pre-stored on the intelligent domestic system second
File is penetrated, positive authentication private key corresponding with the time slice is determined, obtains first private key;
It is described to determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, including:
The time slice residing for current time is determined, then using second mapped file, is determined and the time slice
Corresponding reverse authentication public key, obtains second public key;
Wherein, second mapped file is to each time slice and one-to-one positive respectively with each time slice
Authenticate private key and reverse authentication public key carries out the mapped file of record preservation.
7. smart home user anthority identifying method according to claim 4, it is characterised in that also include:
When the intelligent domestic system is by the authentication to the user terminal, then allow the user terminal to the intelligent family
The intelligent home device occupied in system is controlled.
8. the smart home user anthority identifying method according to claim 5 or 6, it is characterised in that also include:
When the intelligent domestic system is passed through to the intelligence by the authentication to the user terminal, and the user terminal
The authentication of house system, then allow the user terminal to be controlled the intelligent home device in the intelligent domestic system.
9. a kind of user terminal, it is characterised in that including:
Initiation module is asked, for initiating authentication request;
Public key determining module, for initiating authentication request when the request initiation module, it is determined that go out corresponding with current time
Forward direction authentication public key, obtains the first public key;
Public key sending module, for sending first public key to intelligent domestic system;Wherein, when the intelligent domestic system connects
First public key is received, following steps will be executed for the intelligent domestic system:Determine positive mirror corresponding with current time
Private key is weighed, the first private key is obtained, and judges whether first public key matches with first private key, if it is, by right
The authentication of the user terminal, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference
At the time of information.
10. user terminal according to claim 9, it is characterised in that also include:
Public key receiving module, for receiving the second public key that the intelligent domestic system is sent;Wherein, second public key is institute
State intelligent domestic system public by the reverse authentication corresponding with current time determined after the authentication to the user terminal
Key;
Private key determining module, for receiving second public key when the public key receiving module, it is determined that go out and current time
Corresponding reverse authentication private key, obtains the second private key;
Control module is authenticated, for judging whether second public key matches with second private key, if it is, by institute
The authentication of intelligent domestic system is stated, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different
At the time of information.
11. a kind of smart home central control equipment, it is characterised in that including:
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, first public key is that the user is whole
Hold the positive authentication public key corresponding with current time determined after authentication request is initiated;
Private key determining module, for receiving first public key when the public key receiving module, it is determined that go out and current time
Corresponding positive authentication private key, obtains the first private key;
Control module is authenticated, for judging whether first public key matches with first private key, if it is, by institute
The authentication of user terminal is stated, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference
At the time of information.
12. smart home central control equipment according to claim 11, it is characterised in that also include:
Public key determining module, for it is described authentication control module by the authentication to the user terminal after, determine with
Current time corresponding reverse authentication public key, obtains the second public key;
Public key sending module, for sending second public key to the user terminal;Wherein, when the user terminal is received
Second public key, following steps will be executed for the user terminal:Reverse authentication private key corresponding with current time is determined, is obtained
To the second private key, and judge whether second public key matches with second private key, if it is, by the intelligent family
The authentication of system is occupied, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different
At the time of information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710213178.8A CN107104952B (en) | 2017-04-01 | 2017-04-01 | Intelligent household user authentication method, user terminal and central control equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710213178.8A CN107104952B (en) | 2017-04-01 | 2017-04-01 | Intelligent household user authentication method, user terminal and central control equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107104952A true CN107104952A (en) | 2017-08-29 |
CN107104952B CN107104952B (en) | 2020-07-03 |
Family
ID=59675300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710213178.8A Active CN107104952B (en) | 2017-04-01 | 2017-04-01 | Intelligent household user authentication method, user terminal and central control equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107104952B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111030967A (en) * | 2018-10-10 | 2020-04-17 | 千寻位置网络有限公司 | Cloud-based data transmission system, data transmission method and data acquisition method |
CN111131144A (en) * | 2019-11-05 | 2020-05-08 | 远景智能国际私人投资有限公司 | IoT (Internet of things) equipment management method, device, server and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330379A (en) * | 2007-06-22 | 2008-12-24 | 华为技术有限公司 | Method and apparatus for down distributing cryptographic key |
CN103036880A (en) * | 2012-12-12 | 2013-04-10 | 华为技术有限公司 | Network information transmission method, transmission equipment and transmission system |
KR101326243B1 (en) * | 2012-06-04 | 2013-11-11 | 순천향대학교 산학협력단 | User authenticaiton method |
CN105429960A (en) * | 2015-10-29 | 2016-03-23 | 东莞酷派软件技术有限公司 | Method and device for intelligent household terminal authentication |
CN105939198A (en) * | 2016-06-24 | 2016-09-14 | 西安电子科技大学 | Digital signature method based on location under time constraint |
CN106131830A (en) * | 2016-08-30 | 2016-11-16 | 林昌盛威(北京)科技有限公司 | A kind of data processing method, Apparatus and system |
-
2017
- 2017-04-01 CN CN201710213178.8A patent/CN107104952B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101330379A (en) * | 2007-06-22 | 2008-12-24 | 华为技术有限公司 | Method and apparatus for down distributing cryptographic key |
KR101326243B1 (en) * | 2012-06-04 | 2013-11-11 | 순천향대학교 산학협력단 | User authenticaiton method |
CN103036880A (en) * | 2012-12-12 | 2013-04-10 | 华为技术有限公司 | Network information transmission method, transmission equipment and transmission system |
CN105429960A (en) * | 2015-10-29 | 2016-03-23 | 东莞酷派软件技术有限公司 | Method and device for intelligent household terminal authentication |
CN105939198A (en) * | 2016-06-24 | 2016-09-14 | 西安电子科技大学 | Digital signature method based on location under time constraint |
CN106131830A (en) * | 2016-08-30 | 2016-11-16 | 林昌盛威(北京)科技有限公司 | A kind of data processing method, Apparatus and system |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111030967A (en) * | 2018-10-10 | 2020-04-17 | 千寻位置网络有限公司 | Cloud-based data transmission system, data transmission method and data acquisition method |
CN111131144A (en) * | 2019-11-05 | 2020-05-08 | 远景智能国际私人投资有限公司 | IoT (Internet of things) equipment management method, device, server and storage medium |
CN111131144B (en) * | 2019-11-05 | 2021-11-16 | 远景智能国际私人投资有限公司 | IoT (Internet of things) equipment management method, device, server and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107104952B (en) | 2020-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105654580B (en) | Access control method and system, electronic lock, management and visitor's terminal | |
CN103780397B (en) | A kind of multi-screen multiple-factor convenient WEB identity authentication method | |
CN103916389B (en) | Defend the method and fire wall of HttpFlood attacks | |
CN105897424B (en) | A kind of enhancing identity authentication method | |
CN109410410A (en) | Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing | |
WO2010101476A1 (en) | Method and computer program for generation and verification of otp between server and mobile device using multiple channels | |
CN110035071A (en) | A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system | |
CN105553924B (en) | A kind of safety protecting method, smart home and system applied to smart home | |
CN102833066B (en) | Three-party authentication method and device as well as intelligent card supporting two-way authentication | |
CN105119901A (en) | Method and system for detecting phishing hotspot | |
CN105450665A (en) | Secure login method, secure login device and terminal | |
WO2006065002A1 (en) | User authentication method in another network using digital signature made by mobile terminal | |
EP2514135B1 (en) | Systems and methods for authenticating a server by combining image recognition with codes | |
CN110324820A (en) | A kind of Internet of Things safety right appraisal method, system and readable medium | |
CN107104952A (en) | A kind of smart home user anthority identifying method, user terminal and central control equipment | |
KR101202245B1 (en) | System and Method For Transferring Money Using OTP Generated From Account Number | |
CN105991605A (en) | WIFI connection verification method, WIFI hot spot device and terminal | |
CN102255904A (en) | Communication network and terminal authentication method thereof | |
KR101243101B1 (en) | Voice one-time password based user authentication method and system on smart phone | |
KR101407443B1 (en) | User authentication system and method using near field communication | |
CN108521645A (en) | A kind of auth method, system and control system based on identifying code | |
CN101854357A (en) | Method and system for monitoring network authentication | |
CN102164036B (en) | Dynamic token as well as two-way authentication method and two-way authentication system with dynamic token | |
CN103067172A (en) | Information safety management method and system | |
CN105991821A (en) | Antitheft processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |