CN107104952A - A kind of smart home user anthority identifying method, user terminal and central control equipment - Google Patents

A kind of smart home user anthority identifying method, user terminal and central control equipment Download PDF

Info

Publication number
CN107104952A
CN107104952A CN201710213178.8A CN201710213178A CN107104952A CN 107104952 A CN107104952 A CN 107104952A CN 201710213178 A CN201710213178 A CN 201710213178A CN 107104952 A CN107104952 A CN 107104952A
Authority
CN
China
Prior art keywords
authentication
public key
user terminal
private key
different
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710213178.8A
Other languages
Chinese (zh)
Other versions
CN107104952B (en
Inventor
郭辰
徐宇杰
颜铁芳
潘露杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710213178.8A priority Critical patent/CN107104952B/en
Publication of CN107104952A publication Critical patent/CN107104952A/en
Application granted granted Critical
Publication of CN107104952B publication Critical patent/CN107104952B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application discloses a kind of smart home user anthority identifying method, user terminal and central control equipment, this method includes:Authentication request is initiated to intelligent domestic system;Positive authentication public key corresponding with current time is determined, the first public key is obtained;The first public key is sent to intelligent domestic system;Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges whether the first public key matches with the first private key, if it is, by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal;Also, information at the time of different positive authentication public keys corresponds to different, information at the time of different positive authentication private keys corresponds to different.The security of smart home subscription authentication process can be substantially improved in the application, fully maintain the person and property safety of user.

Description

A kind of smart home user anthority identifying method, user terminal and central control equipment
Technical field
The present invention relates to Smart Home technical field, more particularly to a kind of smart home user anthority identifying method, user terminal And central control equipment.
Background technology
Currently, with the fast development of technology of Internet of things, smart home technology is flourished, increasing family Occupy equipment to add in intelligent domestic system, user just can be carried out the intelligent home device of family by the user terminal in hand Remote control, greatly improves the intelligent level of house system.
, it is necessary to intelligent domestic system before user attempts to carry out remote control by user's terminal-pair intelligent home device Authentication operations first are carried out to user terminal, only after authentication passes through, user terminal can be allowed to enter intelligent home device Row remote control.
Current intelligent domestic system, when carrying out authentication operations to user terminal, is based on one set in advance fixed peace Omnicharacteristic value (such as password) user terminal is deployed to authenticate, when intelligent domestic system judges the safety of user terminal transmission Characteristic value is consistent with default legal characteristic value, then can then be allowed by user terminal by the authentication to user terminal Intelligent home device is controlled.
However, because the Special safety value indicative needed for above-mentioned authentication process is default fixed value, it is easy at illegal point It is compromised in the case of sub- malicious intrusions, so that criminal can be reached pair using the security feature value got Intelligent home device carries out the purpose of malice control, it is easy to cause the great person and property loss to user.
In summary as can be seen that the security for how lifting smart home subscription authentication process is urgently to be resolved hurrily at present Problem.
The content of the invention
In view of this, it is an object of the invention to provide a kind of smart home user anthority identifying method, user terminal and center Control device, improves the security of smart home subscription authentication process.Its concrete scheme is as follows:
A kind of smart home user anthority identifying method, it is adaptable to user terminal, including:
Authentication request is initiated to intelligent domestic system;
Positive authentication public key corresponding with current time is determined, the first public key is obtained;
First public key is sent to the intelligent domestic system;
Wherein, when the intelligent domestic system receives first public key, then the intelligent domestic system will perform with Lower step:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judge first public key and institute State whether the first private key matches, if it is, by the authentication to the user terminal, if it is not, then no thoroughfare to described The authentication of user terminal;Also, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys Corresponding to it is different at the time of information.
Optionally, the smart home user anthority identifying method, in addition to:
Obtain the second public key that the intelligent domestic system is sent;Wherein, second public key is the smart home system The reverse authentication public key corresponding with current time that system is determined after by the authentication to the user terminal;
Determine reverse authentication private key corresponding with current time, obtain the second private key, and judge second public key with Whether second private key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare To the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
Optionally, it is described to determine positive authentication public key corresponding with current time, the process of the first public key is obtained, is wrapped Include:
The time slice residing for current time is determined, is then reflected using be pre-stored on the user terminal first File is penetrated, positive authentication public key corresponding with the time slice is determined, obtains first public key;
It is described to determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, including:
The time slice residing for current time is determined, then using first mapped file, is determined and the time The corresponding reverse authentication private key of fragment, obtains second private key;
Wherein, first mapped file is to distinguish one-to-one to each time slice and with each time slice Forward direction authentication public key and reverse authentication private key carry out the mapped file of record preservation.
The invention also discloses another smart home user anthority identifying method, it is adaptable to intelligent domestic system, including:
Receive the first public key that user terminal is sent;Wherein, first public key is that the user terminal is initiating to authenticate The positive authentication public key corresponding with current time determined after request;
Positive authentication private key corresponding with current time is determined, the first private key is obtained;
Judge whether first public key matches with first private key, if it is, by the user terminal Authentication, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Optionally, after the process of the authentication by the user terminal, in addition to:
Reverse authentication public key corresponding with current time is determined, the second public key is obtained, and send to the user terminal Second public key;Wherein, when the user terminal receives second public key, the user terminal will perform following walk Suddenly:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and judges second public key and described the Whether two private keys match, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to described The authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
Optionally, it is described to determine positive authentication private key corresponding with current time, the process of the first private key is obtained, is wrapped Include:
The time slice residing for current time is determined, be pre-stored on the intelligent domestic system is then utilized Two mapped files, determine positive authentication private key corresponding with the time slice, obtain first private key;
It is described to determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, including:
The time slice residing for current time is determined, then using second mapped file, is determined and the time The corresponding reverse authentication public key of fragment, obtains second public key;
Wherein, second mapped file is to distinguish one-to-one to each time slice and with each time slice Forward direction authentication private key and reverse authentication public key carry out the mapped file of record preservation.
Optionally, the smart home user anthority identifying method, in addition to:
When the intelligent domestic system is by the authentication to the user terminal, then allow the user terminal to the intelligence Intelligent home device in energy house system is controlled.
Optionally, the smart home user anthority identifying method, in addition to:
When the intelligent domestic system is passed through to described by the authentication to the user terminal, and the user terminal The authentication of intelligent domestic system, then allow the user terminal to control the intelligent home device in the intelligent domestic system System.
The present invention accordingly discloses a kind of user terminal, including:
Initiation module is asked, for initiating authentication request;
Public key determining module, for initiating authentication request when the request initiation module, it is determined that go out and current time pair The positive authentication public key answered, obtains the first public key;
Public key sending module, for sending first public key to intelligent domestic system;Wherein, when the smart home system System receives first public key, and following steps will be executed for the intelligent domestic system:Determine it is corresponding with current time just To authentication private key, the first private key is obtained, and judges whether first public key matches with first private key, if it is, logical The authentication to the user terminal is crossed, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Optionally, the user terminal, in addition to:
Public key receiving module, for receiving the second public key that the intelligent domestic system is sent;Wherein, second public key Pass through the reverse mirror corresponding with current time determined after the authentication to the user terminal for the intelligent domestic system Weigh public key;
Private key determining module, for receiving second public key when the public key receiving module, it is determined that go out with currently Moment corresponding reverse authentication private key, obtains the second private key;
Control module is authenticated, for judging whether second public key matches with second private key, if it is, passing through To the authentication of the intelligent domestic system, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
The present invention further correspondingly discloses a kind of smart home central control equipment, including:
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, first public key is used to be described The positive authentication public key corresponding with current time that family terminal is determined after authentication request is initiated;
Private key determining module, for receiving first public key when the public key receiving module, it is determined that go out with currently Moment corresponding positive authentication private key, obtains the first private key;
Control module is authenticated, for judging whether first public key matches with first private key, if it is, passing through To the authentication of the user terminal, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Optionally, the smart home central control equipment, in addition to:
Public key determining module, after in the authentication control module by the authentication to the user terminal, it is determined that Go out reverse authentication public key corresponding with current time, obtain the second public key;
Public key sending module, for sending second public key to the user terminal;Wherein, when the user terminal connects Second public key is received, following steps will be executed for the user terminal:Determine that reverse authentication corresponding with current time is private Key, obtains the second private key, and judges whether second public key matches with second private key, if it is, by described The authentication of intelligent domestic system, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
In the present invention, smart home user anthority identifying method, it is adaptable to user terminal, including:Initiated to intelligent domestic system Authentication request;Positive authentication public key corresponding with current time is determined, the first public key is obtained;The is sent to intelligent domestic system One public key;Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal;Also, different forward directions Authenticate information at the time of public key corresponds to different, information at the time of different positive authentication private keys corresponds to different.
It can be seen that, information at the time of different positive authentication public keys and positive authentication private key both correspond to different in the present invention, That is, the positive authentication public key and positive authentication private key in the present invention are not changeless, but can be over time Elapse and occur dynamic change, relative to the technical scheme authenticated in the prior art based on fixed security feature value, sheet The security of smart home subscription authentication process obviously can be substantially improved in invention, fully maintain the person and property of user Safety.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this The embodiment of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis The accompanying drawing of offer obtains other accompanying drawings.
Fig. 1 is a kind of smart home user anthority identifying method timing diagram disclosed in the embodiment of the present invention;
Fig. 2 is a kind of specific smart home user anthority identifying method timing diagram disclosed in the embodiment of the present invention;
Fig. 3 is a kind of user terminal application schematic diagram disclosed in the embodiment of the present invention;
Fig. 4 is another user terminal application schematic diagram disclosed in the embodiment of the present invention;
Fig. 5 is a kind of user terminal hardware structural representation disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
The embodiment of the invention discloses a kind of smart home user anthority identifying method, it is adaptable to which user terminal, Fig. 1 is this implementation The corresponding timing diagram of this method in example, wherein, this method includes below step S11 to S13:
Step S11:Authentication request is initiated to intelligent domestic system.
Step S12:Positive authentication public key corresponding with current time is determined, the first public key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different.Specifically, corresponding under at the time of different Positive authentication public key differ;Or, the positive authentication public key corresponding to different time slices is differed, this feelings Under condition, if wanting to determine positive authentication public key corresponding with current time, need first to determine the time residing for current time Fragment, then determines corresponding positive authentication public key according to the time slice.It is understood that above-mentioned different timeslice Time span corresponding to section can be with identical, naturally it is also possible to inequality.
It should be noted that the positive authentication public key in the present invention refers to that intelligent domestic system reflects to user terminal Public key needed for during power.
In the embodiment of the present invention, the intelligent home device of intelligent domestic system includes but is not limited to intelligent television, intelligent ice Case, intelligent washing machine, intelligent lamp and intelligent air condition etc..
It is understood that, it is necessary to first to all in intelligent domestic system before user terminal initiates authentication request Equipment carries out validation verification, specifically, it is possible to use control key (CK-Control keys) and Hash hardware controls key (HCK-HASH/Hardware CK) to carry out validation verification to all devices in intelligent domestic system.
Step S13:The first public key is sent to intelligent domestic system.
Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal.
Wherein, information at the time of different positive authentication private keys corresponds to different.Specifically, corresponding under at the time of different Positive authentication private key differ;Or, the positive authentication private key corresponding to different time slices is differed.
It should be noted that the positive authentication private key in the present invention refers to that intelligent domestic system reflects to user terminal Private key needed for during power.
In the present embodiment, intelligent domestic system judges that the first public key can include with the process whether the first private key matches: Utilize matching somebody with somebody between the legal positive authentication public key got obtain in real time or prior and legal positive authentication private key To information, to judge whether matched between the first public key and the first private key.In the present embodiment, different legal positive authentication public keys Match from different legal positive authentication private keys.When the unpaired message between the first public key and the first private key is legal pairing Information, then can determine that the first public key and the first private key match, otherwise, it is determined that the first public key and the first private key are mismatched.
Further, the smart home user anthority identifying method in the embodiment of the present invention, can also include:When smart home system System then allows user terminal to be controlled the intelligent home device in intelligent domestic system by the authentication to user terminal.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain The person and property safety of user.
The embodiment of the invention discloses a kind of specific smart home user anthority identifying method, it is adaptable to user terminal, and Fig. 2 is The corresponding timing diagram of this method, this method specifically includes below step S21 to S28:
Step S21:Authentication request is initiated to intelligent domestic system.
Step S22:Positive authentication public key corresponding with current time is determined, the first public key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different.
Specifically, above-mentioned determine positive authentication public key corresponding with current time, the process of the first public key is obtained, is wrapped Include:The time slice residing for current time is determined, then using the first mapped file pre-saved on the subscriber terminal, really Positive authentication public key corresponding with the time slice is made, the first public key is obtained.
In the present embodiment, above-mentioned first mapped file is to distinguish one by one to each time slice and with each time slice Corresponding positive authentication public key and reverse authentication private key carry out the mapped file of record preservation.It should be noted that in the present invention Positive authentication public key refer to intelligent domestic system public key required during being authenticated to user terminal, reverse authentication Private key refers to user terminal private key required during being authenticated to intelligent domestic system.
That is, continuous N number of time slice, and record successively in time can be recorded in above-mentioned first mapped file One-to-one N number of forward direction authenticates public key respectively with above-mentioned N number of time slice, is also recorded in addition and above-mentioned N number of time slice The one-to-one N number of reverse authentication private key of difference.It is understood that different time fragment in above-mentioned N number of time slice Time span can be identical, certainly, in order to further lift the different time piece in security, above-mentioned N number of time slice The time span of section can also be differed, that is, the different time fragment in above-mentioned N number of time slice can in time span With having differences property, and above-mentioned otherness preferentially can be designed to irregular otherness.
In the present embodiment, it is assumed that user terminal initiates authentication request under the A moment, then when user terminal will determine A Residing time slice is carved, and then determines that positive authentication corresponding with the time slice is public using above-mentioned first mapped file Key.After this, if user terminal is inscribed in B and initiates authentication request, user will determine residing for the B moment when Between fragment, it is to be understood that if time slice residing for the A moment is same timeslice with the time slice residing for the B moment Section, then the positive authentication public key corresponding to the B moment is identical with the positive authentication public key corresponding to the A moment, if residing for the A moment Time slice and the not same time slice of time slice residing for the B moment, then the positive authentication public key corresponding to the B moment is different In the positive authentication public key corresponding to the A moment.
In the present embodiment, user terminal can obtain above-mentioned first mapping by the preassigned webserver in advance File, and the first mapped file that the webserver is sent to user terminal then can come from preassigned security server. It is understood that the safe security in the webserver of security server.Secondly, preserved in security server Each forward direction authentication public key and reverse authentication private key can utilize HSM (i.e. Hardware Security Module, hardware peace Full module) generate.
It is understood that in the present embodiment, before user terminal initiates authentication request, user terminal need in advance from Above-mentioned first mapped file is obtained in the above-mentioned webserver.
Step S23:The first public key is sent to intelligent domestic system.
Wherein, when intelligent domestic system receives the first public key, then following steps will be executed for intelligent domestic system:Determine Positive authentication private key corresponding with current time, obtains the first private key, and judges whether the first public key matches with the first private key, such as Fruit is, then by the authentication to user terminal, if it is not, then no thoroughfare to the authentication of user terminal.
Wherein, information at the time of different positive authentication private keys corresponds to different.
Specifically, above-mentioned determine positive authentication private key corresponding with current time, the process of the first private key is obtained, is wrapped Include:The time slice residing for current time is determined, the second mapping text being pre-stored on intelligent domestic system is then utilized Part, determines positive authentication private key corresponding with the time slice, obtains the first private key.
In the present embodiment, the second mapped file is to be corresponded respectively to each time slice and with each time slice Positive authentication private key and reverse authentication public key carry out the mapped file of record preservation.
In order to improve security, above-mentioned intelligent domestic system preferentially obtains above-mentioned second mapping from above-mentioned security server File.In addition, each forward direction authentication private key and reverse authentication public key for being preserved in security server can utilize HSM next life Into.
It is understood that in the present embodiment, before user terminal initiates authentication request, intelligent domestic system needs pre- Above-mentioned second mapped file is first obtained from above-mentioned security server.
In addition, in the present embodiment, time slice information in above-mentioned first mapped file with the second mapped file when Between piece segment information be identical.Further, when the time slice information in above-mentioned first mapped file and the second mapped file After changing, for the sake of security, validation verification can be carried out to all devices in intelligent domestic system again, specifically , it is possible to use control key and Hash hardware controls key are tested to carry out validity to all devices in intelligent domestic system Card.
It should be noted that the positive authentication private key in the present invention refers to that intelligent domestic system reflects to user terminal Private key needed for during power, reverse authentication public key refers to user terminal during being authenticated to intelligent domestic system Required public key.
Step S24:Obtain the second public key that intelligent domestic system is sent;Wherein, the second public key is that intelligent domestic system exists By determining reverse authentication public key corresponding with current time after the authentication to user terminal.
Wherein, information at the time of different reverse authentication public keys corresponds to different.
In the present embodiment, intelligent domestic system determines the process of above-mentioned second public key, specifically includes:When determining current Residing time slice is carved, then using above-mentioned second mapped file, determines that reverse authentication corresponding with the time slice is public Key, obtains the second public key.
Step S25:Reverse authentication private key corresponding with current time is determined, the second private key is obtained.
Wherein, different reverse authentication private key correspondences from it is different at the time of information.
Specifically, above-mentioned determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, can be with Including:The time slice residing for current time is determined, then using above-mentioned first mapped file, is determined and the time slice Corresponding reverse authentication private key, obtains the second private key.
Step S26:Judge whether the second public key matches with the second private key, if it is, into step S27, if it is not, then Into step S28.
In the present embodiment, user terminal judges that the second public key can include with the process whether the second private key matches:Utilize Pairing letter obtain in real time or between the prior legal reverse authentication public key got and legal reverse authentication private key Breath, to judge whether matched between the second public key and the second private key.
Step S27:Pass through the authentication to intelligent domestic system.
Step S28:No thoroughfare to the authentication of intelligent domestic system.
In the present embodiment, when intelligent domestic system is passed through to intelligence by the authentication to user terminal, and user terminal The authentication of house system, then can allow user terminal to be controlled the intelligent home device in intelligent domestic system, otherwise User terminal is forbidden to be controlled intelligent home device.That is, the embodiment of the present invention needs the feelings passed through in bi-directional authentification Under condition, user terminal can be allowed to be controlled intelligent home device, this passes through to user relative to when intelligent domestic system The authentication of terminal just allows to obtain stronger guarantor in terms of the situation that user terminal is controlled intelligent home device, security Barrier.
Shown in Figure 1, the embodiment of the invention discloses another smart home user anthority identifying method, it is adaptable to intelligent family System is occupied, this method includes below step S31 to S35:
Step S31:Receive the first public key that user terminal is sent;Wherein, the first public key is that user terminal is initiating to authenticate The positive authentication public key corresponding with current time determined after request.
Step S32:Positive authentication private key corresponding with current time is determined, the first private key is obtained.
Step S33:Judge whether the first public key matches with the first private key, if it is, into step S34, if it is not, then Into step S35.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Step S34:Pass through the authentication to user terminal.
Step S35:No thoroughfare to the authentication of user terminal.
, can be in the case where intelligent domestic system be by the authentication to user terminal in the present embodiment, it is allowed to which user is whole End is controlled to the intelligent home device in intelligent domestic system.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain The person and property safety of user.
Shown in Figure 2, the embodiment of the invention discloses a kind of specific smart home user anthority identifying method, it is adaptable to intelligence Energy house system, this method includes below step S41 to 47:
Step S41:Receive the first public key that user terminal is sent;Wherein, the first public key is that user terminal is initiating to authenticate The positive authentication public key corresponding with current time determined after request.
Specifically, the above-mentioned process for determining the first public key, including:The time slice residing for current time is determined, so Afterwards using the first mapped file pre-saved on the subscriber terminal, determine that positive authentication corresponding with the time slice is public Key, obtains the first public key.
In the present embodiment, above-mentioned first mapped file is to distinguish one by one to each time slice and with each time slice Corresponding positive authentication public key and reverse authentication private key carry out the mapped file of record preservation.
Step S42:Positive authentication private key corresponding with current time is determined, the first private key is obtained.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Specifically, the above-mentioned process for determining the first private key, including:The time slice residing for current time is determined, so Afterwards using the second mapped file being pre-stored on intelligent domestic system, positive authentication corresponding with the time slice is determined Private key, obtains the first private key.
Wherein, the second mapped file is to each time slice and one-to-one positive respectively with each time slice Authenticate private key and reverse authentication public key carries out the mapped file of record preservation.
Step S43:Judge whether the first public key matches with the first private key, if it is, into step S44, if it is not, then Into step S45.
Step S44:By the authentication to user terminal, subsequently into step S46.
Step S45:No thoroughfare to the authentication of user terminal.
Step S46:Reverse authentication public key corresponding with current time is determined, the second public key is obtained.
Specifically, above-mentioned determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, can be with Including:The time slice residing for current time is determined, then using above-mentioned second mapped file, is determined and the time slice Corresponding reverse authentication public key, obtains the second public key.
Step S47:The second public key is sent to user terminal;Wherein, when user terminal receives the second public key, user terminal Following steps will be executed:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and judge the second public key Whether matched with the second private key, if it is, by the authentication to intelligent domestic system, if it is not, then no thoroughfare to intelligence The authentication of house system;
In the present embodiment, the determination process of above-mentioned second private key can specifically include:Determine residing for current time when Between fragment, then using above-mentioned first mapped file, determine reverse authentication private key corresponding with the time slice, obtain second Private key.
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
In the present embodiment, when intelligent domestic system is passed through to intelligence by the authentication to user terminal, and user terminal The authentication of house system, then can allow user terminal to be controlled the intelligent home device in intelligent domestic system.
The present invention further correspondingly discloses a kind of user terminal, shown in Figure 3, and the user terminal includes:
Initiation module 11 is asked, for initiating authentication request;
Public key determining module 12, for initiating authentication request when request initiation module 11, it is determined that go out and current time pair The positive authentication public key answered, obtains the first public key;
Public key sending module 13, for sending the first public key to intelligent domestic system;Wherein, when intelligent domestic system is received To the first public key, following steps will be executed for intelligent domestic system:Positive authentication private key corresponding with current time is determined, is obtained First private key, and judge whether the first public key matches with the first private key, if it is, by the authentication to user terminal, if No, then no thoroughfare to the authentication of user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain The person and property safety of user.
Further, shown in Figure 4, the user terminal in the present embodiment can also include:
Public key receiving module 14, the second public key for receiving intelligent domestic system transmission;Wherein, the second public key is intelligence House system is by determining reverse authentication public key corresponding with current time after the authentication to user terminal;
Private key determining module 15, for receiving the second public key when public key receiving module 14, it is determined that go out and current time Corresponding reverse authentication private key, obtains the second private key;
Control module 16 is authenticated, for judging whether the second public key matches with the second private key, if it is, by intelligence The authentication of house system, if it is not, then no thoroughfare to the authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
The embodiment of the present invention further discloses a kind of smart home central control equipment, including public key receiving module, Private key determining module and authentication control module;Wherein,
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, the first public key is that user terminal exists Initiate the positive authentication public key corresponding with current time determined after authentication request;
Private key determining module, for receiving the first public key when public key receiving module, it is determined that go out corresponding with current time Positive authentication private key, obtain the first private key;
Control module is authenticated, for judging whether the first public key matches with the first private key, if it is, by whole to user The authentication at end, if it is not, then no thoroughfare to the authentication of user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
It can be seen that, at the time of different positive authentication public keys and positive authentication private key both correspond to different in the embodiment of the present invention Information, that is, the positive authentication public key and positive authentication private key in the embodiment of the present invention are not changeless, but can Dynamic change occurs over time, relative to the skill authenticated in the prior art based on fixed security feature value The security of smart home subscription authentication process obviously can be substantially improved in art scheme, the embodiment of the present invention, fully maintain The person and property safety of user.
Further, the smart home central control equipment in the present embodiment, can also include public key determining module and public affairs Key sending module;Wherein,
Public key determining module, for after control module is authenticated by the authentication to user terminal, determining and currently Moment corresponding reverse authentication public key, obtains the second public key;
Public key sending module, for sending the second public key to user terminal;Wherein, when user terminal receives the second public affairs Key, following steps will be executed for user terminal:Reverse authentication private key corresponding with current time is determined, the second private key is obtained, and Judge whether the second public key matches with the second private key, if it is, by the authentication to intelligent domestic system, if it is not, then prohibiting Only pass through the authentication to intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences with Information at the time of different.
Shown in Figure 5 the embodiment of the invention also discloses a kind of user terminal, the user terminal includes the He of processor 21 Memory 22;Wherein, processor 21 performs following steps by transferring the instruction stored in memory 22:
Authentication request is initiated, it is then determined that going out positive authentication public key corresponding with current time, the first public key is obtained, then The first public key is sent to intelligent domestic system;Wherein, when intelligent domestic system receives the first public key, intelligent domestic system will be held Row following steps:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges the first public key and the Whether one private key matches, if it is, by the authentication to user terminal, if it is not, then no thoroughfare to the mirror of user terminal Power.
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to Information at the time of different.
Further, in the embodiment of the present invention, above-mentioned processor 21 can also be by transferring the finger stored in memory 22 Make performing following steps:The second public key that intelligent domestic system is sent is received, it is then determined that going out corresponding with current time anti- To authentication private key, the second private key is obtained, then judges whether the second public key matches with the second private key, if it is, by intelligence Can house system authentication, if it is not, then no thoroughfare to the authentication of intelligent domestic system;Wherein, the second public key is intelligent family System is occupied by determining reverse authentication public key corresponding with current time after the authentication to user terminal, different is reverse Authenticate information at the time of public key corresponds to different, different reverse authentication private key correspondences from it is different at the time of information.
It is understood that the user terminal in the present embodiment still further comprises battery 23, communication chip 24, display screen 25th, output device 26 and input unit 27.
It is understood that processor in the present embodiment, memory, battery, communication chip, display screen, output device and The quantity of input unit may each be odd number or a plurality of, they not limited one by one herein.In addition, this The operating system of user terminal can include one or more of existing all main flow terminal operating systems in embodiment, also may be used So that including following operating system newly developed, the operating system of user terminal is specifically limited in this is not to the present embodiment.
Finally, in addition it is also necessary to explanation, herein, such as first and second or the like relational terms be used merely to by One entity or operation make a distinction with another entity or operation, and not necessarily require or imply these entities or operation Between there is any this actual relation or order.Moreover, term " comprising ", "comprising" or its any other variant meaning Covering including for nonexcludability, so that process, method, article or equipment including a series of key elements not only include that A little key elements, but also other key elements including being not expressly set out, or also include be this process, method, article or The intrinsic key element of equipment.In the absence of more restrictions, the key element limited by sentence "including a ...", is not arranged Except also there is other identical element in the process including the key element, method, article or equipment.
A kind of smart home user anthority identifying method provided by the present invention, user terminal and central control equipment are entered above Go and be discussed in detail, specific case used herein is set forth to the principle and embodiment of the present invention, and the above is implemented The explanation of example is only intended to the method and its core concept for helping to understand the present invention;Simultaneously for the general technology people of this area Member, according to the thought of the present invention, will change in specific embodiments and applications, in summary, this explanation Book content should not be construed as limiting the invention.

Claims (12)

1. a kind of smart home user anthority identifying method, it is adaptable to user terminal, it is characterised in that including:
Authentication request is initiated to intelligent domestic system;
Positive authentication public key corresponding with current time is determined, the first public key is obtained;
First public key is sent to the intelligent domestic system;
Wherein, when the intelligent domestic system receives first public key, then the intelligent domestic system will perform following walk Suddenly:Positive authentication private key corresponding with current time is determined, the first private key is obtained, and judges first public key and described the Whether one private key matches, if it is, by the authentication to the user terminal, if it is not, then no thoroughfare to the user The authentication of terminal;Also, information at the time of different positive authentication public keys corresponds to different, different positive authentication private key correspondences The information in different at the time of.
2. smart home user anthority identifying method according to claim 1, it is characterised in that also include:
Obtain the second public key that the intelligent domestic system is sent;Wherein, second public key is that the intelligent domestic system exists Pass through the reverse authentication public key corresponding with current time determined after the authentication to the user terminal;
Determine reverse authentication private key corresponding with current time, obtain the second private key, and judge second public key with it is described Whether the second private key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to institute State the authentication of intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different At the time of information.
3. smart home user anthority identifying method according to claim 2, it is characterised in that
It is described to determine positive authentication public key corresponding with current time, the process of the first public key is obtained, including:
The time slice residing for current time is determined, the first mapping text being pre-stored on the user terminal is then utilized Part, determines positive authentication public key corresponding with the time slice, obtains first public key;
It is described to determine reverse authentication private key corresponding with current time, the process of the second private key is obtained, including:
The time slice residing for current time is determined, then using first mapped file, is determined and the time slice Corresponding reverse authentication private key, obtains second private key;
Wherein, first mapped file is to each time slice and one-to-one positive respectively with each time slice Authenticate public key and reverse authentication private key carries out the mapped file of record preservation.
4. a kind of smart home user anthority identifying method, it is adaptable to intelligent domestic system, it is characterised in that including:
Receive the first public key that user terminal is sent;Wherein, first public key is that the user terminal is initiating authentication request The positive authentication public key corresponding with current time determined afterwards;
Positive authentication private key corresponding with current time is determined, the first private key is obtained;
Judge whether first public key matches with first private key, if it is, by the authentication to the user terminal, If it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference At the time of information.
5. smart home user anthority identifying method according to claim 4, it is characterised in that described by whole to the user After the process of the authentication at end, in addition to:
Reverse authentication public key corresponding with current time is determined, the second public key is obtained, and send described to the user terminal Second public key;Wherein, when the user terminal receives second public key, following steps will be executed for the user terminal:Really Reverse authentication private key corresponding with current time is made, the second private key is obtained, and judge that second public key is private with described second Whether key matches, if it is, by the authentication to the intelligent domestic system, if it is not, then no thoroughfare to the intelligence The authentication of house system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different At the time of information.
6. smart home user anthority identifying method according to claim 5, it is characterised in that
It is described to determine positive authentication private key corresponding with current time, the process of the first private key is obtained, including:
The time slice residing for current time is determined, is then reflected using be pre-stored on the intelligent domestic system second File is penetrated, positive authentication private key corresponding with the time slice is determined, obtains first private key;
It is described to determine reverse authentication public key corresponding with current time, the process of the second public key is obtained, including:
The time slice residing for current time is determined, then using second mapped file, is determined and the time slice Corresponding reverse authentication public key, obtains second public key;
Wherein, second mapped file is to each time slice and one-to-one positive respectively with each time slice Authenticate private key and reverse authentication public key carries out the mapped file of record preservation.
7. smart home user anthority identifying method according to claim 4, it is characterised in that also include:
When the intelligent domestic system is by the authentication to the user terminal, then allow the user terminal to the intelligent family The intelligent home device occupied in system is controlled.
8. the smart home user anthority identifying method according to claim 5 or 6, it is characterised in that also include:
When the intelligent domestic system is passed through to the intelligence by the authentication to the user terminal, and the user terminal The authentication of house system, then allow the user terminal to be controlled the intelligent home device in the intelligent domestic system.
9. a kind of user terminal, it is characterised in that including:
Initiation module is asked, for initiating authentication request;
Public key determining module, for initiating authentication request when the request initiation module, it is determined that go out corresponding with current time Forward direction authentication public key, obtains the first public key;
Public key sending module, for sending first public key to intelligent domestic system;Wherein, when the intelligent domestic system connects First public key is received, following steps will be executed for the intelligent domestic system:Determine positive mirror corresponding with current time Private key is weighed, the first private key is obtained, and judges whether first public key matches with first private key, if it is, by right The authentication of the user terminal, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference At the time of information.
10. user terminal according to claim 9, it is characterised in that also include:
Public key receiving module, for receiving the second public key that the intelligent domestic system is sent;Wherein, second public key is institute State intelligent domestic system public by the reverse authentication corresponding with current time determined after the authentication to the user terminal Key;
Private key determining module, for receiving second public key when the public key receiving module, it is determined that go out and current time Corresponding reverse authentication private key, obtains the second private key;
Control module is authenticated, for judging whether second public key matches with second private key, if it is, by institute The authentication of intelligent domestic system is stated, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different At the time of information.
11. a kind of smart home central control equipment, it is characterised in that including:
Public key receiving module, the first public key for receiving user terminal transmission;Wherein, first public key is that the user is whole Hold the positive authentication public key corresponding with current time determined after authentication request is initiated;
Private key determining module, for receiving first public key when the public key receiving module, it is determined that go out and current time Corresponding positive authentication private key, obtains the first private key;
Control module is authenticated, for judging whether first public key matches with first private key, if it is, by institute The authentication of user terminal is stated, if it is not, then no thoroughfare to the authentication of the user terminal;
Wherein, information at the time of different positive authentication public keys corresponds to different, different positive authentication private keys correspond to difference At the time of information.
12. smart home central control equipment according to claim 11, it is characterised in that also include:
Public key determining module, for it is described authentication control module by the authentication to the user terminal after, determine with Current time corresponding reverse authentication public key, obtains the second public key;
Public key sending module, for sending second public key to the user terminal;Wherein, when the user terminal is received Second public key, following steps will be executed for the user terminal:Reverse authentication private key corresponding with current time is determined, is obtained To the second private key, and judge whether second public key matches with second private key, if it is, by the intelligent family The authentication of system is occupied, if it is not, then no thoroughfare to the authentication of the intelligent domestic system;
Wherein, information at the time of different reverse authentication public keys corresponds to different, different reverse authentication private key correspondences from it is different At the time of information.
CN201710213178.8A 2017-04-01 2017-04-01 Intelligent household user authentication method, user terminal and central control equipment Active CN107104952B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710213178.8A CN107104952B (en) 2017-04-01 2017-04-01 Intelligent household user authentication method, user terminal and central control equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710213178.8A CN107104952B (en) 2017-04-01 2017-04-01 Intelligent household user authentication method, user terminal and central control equipment

Publications (2)

Publication Number Publication Date
CN107104952A true CN107104952A (en) 2017-08-29
CN107104952B CN107104952B (en) 2020-07-03

Family

ID=59675300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710213178.8A Active CN107104952B (en) 2017-04-01 2017-04-01 Intelligent household user authentication method, user terminal and central control equipment

Country Status (1)

Country Link
CN (1) CN107104952B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111030967A (en) * 2018-10-10 2020-04-17 千寻位置网络有限公司 Cloud-based data transmission system, data transmission method and data acquisition method
CN111131144A (en) * 2019-11-05 2020-05-08 远景智能国际私人投资有限公司 IoT (Internet of things) equipment management method, device, server and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330379A (en) * 2007-06-22 2008-12-24 华为技术有限公司 Method and apparatus for down distributing cryptographic key
CN103036880A (en) * 2012-12-12 2013-04-10 华为技术有限公司 Network information transmission method, transmission equipment and transmission system
KR101326243B1 (en) * 2012-06-04 2013-11-11 순천향대학교 산학협력단 User authenticaiton method
CN105429960A (en) * 2015-10-29 2016-03-23 东莞酷派软件技术有限公司 Method and device for intelligent household terminal authentication
CN105939198A (en) * 2016-06-24 2016-09-14 西安电子科技大学 Digital signature method based on location under time constraint
CN106131830A (en) * 2016-08-30 2016-11-16 林昌盛威(北京)科技有限公司 A kind of data processing method, Apparatus and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101330379A (en) * 2007-06-22 2008-12-24 华为技术有限公司 Method and apparatus for down distributing cryptographic key
KR101326243B1 (en) * 2012-06-04 2013-11-11 순천향대학교 산학협력단 User authenticaiton method
CN103036880A (en) * 2012-12-12 2013-04-10 华为技术有限公司 Network information transmission method, transmission equipment and transmission system
CN105429960A (en) * 2015-10-29 2016-03-23 东莞酷派软件技术有限公司 Method and device for intelligent household terminal authentication
CN105939198A (en) * 2016-06-24 2016-09-14 西安电子科技大学 Digital signature method based on location under time constraint
CN106131830A (en) * 2016-08-30 2016-11-16 林昌盛威(北京)科技有限公司 A kind of data processing method, Apparatus and system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111030967A (en) * 2018-10-10 2020-04-17 千寻位置网络有限公司 Cloud-based data transmission system, data transmission method and data acquisition method
CN111131144A (en) * 2019-11-05 2020-05-08 远景智能国际私人投资有限公司 IoT (Internet of things) equipment management method, device, server and storage medium
CN111131144B (en) * 2019-11-05 2021-11-16 远景智能国际私人投资有限公司 IoT (Internet of things) equipment management method, device, server and storage medium

Also Published As

Publication number Publication date
CN107104952B (en) 2020-07-03

Similar Documents

Publication Publication Date Title
CN105654580B (en) Access control method and system, electronic lock, management and visitor's terminal
CN103780397B (en) A kind of multi-screen multiple-factor convenient WEB identity authentication method
CN103916389B (en) Defend the method and fire wall of HttpFlood attacks
CN105897424B (en) A kind of enhancing identity authentication method
CN109410410A (en) Method, apparatus, system and the electronic equipment of intelligent door lock Cipher Processing
WO2010101476A1 (en) Method and computer program for generation and verification of otp between server and mobile device using multiple channels
CN110035071A (en) A kind of long-range double factor mutual authentication method, client and server-side towards industrial control system
CN105553924B (en) A kind of safety protecting method, smart home and system applied to smart home
CN102833066B (en) Three-party authentication method and device as well as intelligent card supporting two-way authentication
CN105119901A (en) Method and system for detecting phishing hotspot
CN105450665A (en) Secure login method, secure login device and terminal
WO2006065002A1 (en) User authentication method in another network using digital signature made by mobile terminal
EP2514135B1 (en) Systems and methods for authenticating a server by combining image recognition with codes
CN110324820A (en) A kind of Internet of Things safety right appraisal method, system and readable medium
CN107104952A (en) A kind of smart home user anthority identifying method, user terminal and central control equipment
KR101202245B1 (en) System and Method For Transferring Money Using OTP Generated From Account Number
CN105991605A (en) WIFI connection verification method, WIFI hot spot device and terminal
CN102255904A (en) Communication network and terminal authentication method thereof
KR101243101B1 (en) Voice one-time password based user authentication method and system on smart phone
KR101407443B1 (en) User authentication system and method using near field communication
CN108521645A (en) A kind of auth method, system and control system based on identifying code
CN101854357A (en) Method and system for monitoring network authentication
CN102164036B (en) Dynamic token as well as two-way authentication method and two-way authentication system with dynamic token
CN103067172A (en) Information safety management method and system
CN105991821A (en) Antitheft processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant