CN107612949B - Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint - Google Patents

Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint Download PDF

Info

Publication number
CN107612949B
CN107612949B CN201711112106.0A CN201711112106A CN107612949B CN 107612949 B CN107612949 B CN 107612949B CN 201711112106 A CN201711112106 A CN 201711112106A CN 107612949 B CN107612949 B CN 107612949B
Authority
CN
China
Prior art keywords
intelligent terminal
server
wireless intelligent
authentication
radio frequency
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711112106.0A
Other languages
Chinese (zh)
Other versions
CN107612949A (en
Inventor
陈宜
文红
谢非佚
陈松林
宋欢欢
胡林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201711112106.0A priority Critical patent/CN107612949B/en
Publication of CN107612949A publication Critical patent/CN107612949A/en
Application granted granted Critical
Publication of CN107612949B publication Critical patent/CN107612949B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a wireless intelligent terminal access authentication method and a wireless intelligent terminal access authentication system based on radio frequency fingerprints, wherein the method comprises the following steps: s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal; s2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result. The invention provides a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints, which can realize mutual authentication between a wireless intelligent terminal and a server, reduce the complexity of identity authentication of a mobile intelligent terminal and improve the safety of identity authentication.

Description

Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
Technical Field
The invention relates to the field of wireless intelligent terminal equipment access authentication, in particular to a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints.
Background
With the rapid development of mobile internet technology and the change of mobile terminals, various mobile terminals such as smart phones and tablet computers have penetrated into daily life and work, and especially have a wide application prospect in the aspects of emerging internet of things and cloud computing. However, the performance of the mobile intelligent terminal is limited due to the cost limitation, and the open mobile wireless network itself has many risks, and is vulnerable to intrusion by hackers or illegal users and other attacks, such as cloning, replay, impersonation, eavesdropping, tampering, denial of service attack, and the like. Identity authentication of two communication parties is the basis and key of information security and privacy protection, and once an identity authentication system is damaged, the system has no security.
The traditional authentication system is implemented based on a cryptographic system and a security protocol, that is, two communication parties verify the validity of the identities of each other by means of interaction of challenge and response according to secret information shared in advance. Common identity authentication modes mainly comprise static password authentication, one-time password authentication, digital certificate-based identity authentication and hardware equipment-based identity authentication. But their application has certain limitations. Compared with the traditional PC identity authentication, the identity authentication of the mobile intelligent terminal has some differences, such as: the mobile intelligent terminal has limited calculation and storage capacity and limited energy consumption, is not suitable for adopting a complex encryption algorithm, and needs to avoid frequent communication times and the like. Therefore, a safe identity authentication scheme suitable for the mobile intelligent terminal communication system needs to be designed.
In recent years, a non-password authentication technology based on physical layer information is proposed for information security and privacy protection of wireless devices, and the non-password authentication mode has the characteristics of higher security performance and low complexity. Radio Frequency Fingerprint (RFF) based radio transmission device identification and verification is one of the non-password authentication techniques. The technology carries out waveform extraction on a received radio signal carrying hardware information of radio transmitting equipment to obtain an RFF, wherein the RFF embodies the unique characteristic of the hardware of the radio transmitting equipment; the main reason for the RFF is the tolerance phenomenon of the electronic components of the wireless transmitter. Component tolerances result in the system properties not being exactly the same even if the structure of the radio transmitting part is the same as the component nominal value; in the radio frequency band, small component difference can also cause great difference of radio frequency signals, so that the unique identification of the electronic equipment through the RFF is feasible; and the RFF-based authentication fully utilizes the hardware characteristics of the terminal, almost does not need additional calculation and has low complexity.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints, which can realize mutual authentication between a wireless intelligent terminal and a server, reduce the complexity of identity authentication of the wireless intelligent terminal and improve the safety of identity authentication.
The purpose of the invention is realized by the following technical scheme: a wireless intelligent terminal access authentication method based on radio frequency fingerprints comprises the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal; specifically, the step S1 includes the following sub-steps: s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function; s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server; s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS; s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists: if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal; if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished; and S105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration.
S2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result. Specifically, the step S2 includes the following sub-steps: s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0; s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the wireless intelligent terminal from the received signal waveformRadio frequency fingerprint RFFc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database: if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected; if yes, go to step S203; s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID: if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID); if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2The step (S) includes encrypted password information (CS), random number information (PS) (new), and shared secret value information (K), and the step (S204) is proceeded; s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal: if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server; if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3(ii) a S205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification: if message M3If the verification fails, the server refuses the login of the wireless intelligent terminal; if message M3After the verification is successful, the server extracts and verifies the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveform againc(M3) If the verification is unsuccessful, the login of the wireless intelligent terminal is refused; and if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server.
Preferably, in step S104, the server determines whether the user already exists as follows: and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered to exist.
A wireless intelligent terminal access authentication system based on radio frequency fingerprints comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user;
the server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result;
and the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.
The invention has the beneficial effects that: the method is efficient, flexible and independent of a third party, the server side has the function of extracting and identifying the radio frequency fingerprint when receiving the signal, and the mobile intelligent terminal does not need to add extra hardware, so that the complexity and the expense of the mobile intelligent terminal are reduced, common attacks such as cloning, replaying, counterfeiting and the like can be resisted, the anonymity requirement of the mobile intelligent terminal is met, mutual authentication between the intelligent terminal and the server is realized, the complexity of identity authentication of the mobile intelligent terminal is reduced, and the safety of identity authentication is improved.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a flow chart of the present invention for performing initial registration entry;
FIG. 3 is a flow chart of the present invention for performing a login authentication;
fig. 4 is a schematic block diagram of the system of the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in fig. 1, a wireless intelligent terminal access authentication method based on radio frequency fingerprint includes the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal;
s2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result.
As shown in fig. 2, the step S1 includes the following sub-steps:
s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function;
s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server;
s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS;
s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists:
if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal;
if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished;
and S105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration.
In the embodiment of the present application, in the step S104, the server determines whether the user already exists as follows: and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered to exist.
As shown in fig. 3, the step S2 includes the following sub-steps:
s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0;
s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveformc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database:
if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected;
if yes, go to step S203;
s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID:
if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID);
if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2The step (S) includes encrypted password information (CS), random number information (PS) (new), and shared secret value information (K), and the step (S204) is proceeded;
in an embodiment of the present application, the verification message M2Comprising P, W two parameters, wherein:
Figure BDA0001465487090000051
h () represents a hash operation;
s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal:
if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server;
if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3
In this embodiment, for the authentication message M2The verification method of (1) is as follows:
the parameter CS' ═ h (pw) is calculated,
Figure BDA0001465487090000052
Figure BDA0001465487090000053
if the parameter W 'is equal to W, the authentication is successful, otherwise, the authentication is failed, and the updated ID is equal to PS'; authentication message M sent again to the server3Comprises the following steps:
Figure BDA0001465487090000054
s205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification:
in this embodiment, message M3The verification method of (1) is as follows:
calculating parameters
Figure BDA0001465487090000055
If the parameter M3' and M3If the two are equal, the verification is successful, otherwise, the verification fails.
If message M3If the verification fails, the server refuses the login of the wireless intelligent terminal;
if message M3Is verified asAnd the server extracts and verifies the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveform againc(M3) Verifying, and if the verification is unsuccessful, refusing the login of the wireless intelligent terminal; and if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server.
All symbols in the above embodiments
Figure BDA0001465487090000056
All represent exclusive or operators; all symbols "|", denote the join operator.
A wireless intelligent terminal access authentication system based on radio frequency fingerprints comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user; in an embodiment of the present application, the wireless smart terminal includes: the registration module is used for inputting a registration password by a user, encrypting the registration password, transmitting the encrypted registration password to the server and storing a shared secret value generated by the server; and the login module is used for inputting a login password by a user and completing bidirectional authentication with the server.
The server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result; in an embodiment of the present application, the server includes: the registration entry module is used for extracting the radio frequency fingerprint of the wireless intelligent terminal initiating the registration request, generating a shared secret value and transmitting the shared secret value to the wireless intelligent terminal, and storing the registration password of the user, the radio frequency fingerprint of the wireless intelligent terminal and the shared secret value as initial registration entry information in a database; and the access authentication module interacts with the wireless intelligent terminal to complete bidirectional interactive authentication according to the radio frequency fingerprint of the wireless intelligent terminal, the login password and the initialized entry information in the database during login when a user initiates a login request.
And the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.

Claims (2)

1. A wireless intelligent terminal access authentication method based on radio frequency fingerprint is characterized in that: the method comprises the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal;
s2, operating login authentication: when a user requests to log in a server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result;
the step S1 includes the following sub-steps:
s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function;
s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server;
s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS;
s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists:
if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal;
if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished;
s105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration;
in step S104, the process of the server determining whether the user already exists is as follows: if the radio frequency fingerprint RFF of the wireless intelligent terminal already exists in the current database, the user is considered to exist, and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered not to exist;
the step S2 includes the following sub-steps:
s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0;
s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveformc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database:
if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected;
if yes, go to step S203;
s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID:
if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID);
if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2Includes encrypted cryptographic information CS, random number information ps (new), and shared secret value information K,entering step S204;
the verification message M2Comprising P, W two parameters, wherein:
Figure FDA0002259189390000021
h () represents a hash operation;
Figure FDA0002259189390000022
representing an exclusive or operator; all symbols "|" represent the join operator;
s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal:
if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server;
if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3
For authentication message M2The verification method of (1) is as follows:
the parameter CS' ═ h (pw) is calculated,
Figure FDA0002259189390000023
if the parameter W 'is equal to W, the authentication is successful, otherwise, the authentication is failed, and the updated ID is equal to PS'; authentication message M sent again to the server3Comprises the following steps:
Figure FDA0002259189390000024
s205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification:
if message M3If the verification fails, the server refuses the login of the wireless intelligent terminal;
if message M3After the verification is successful, the server extracts and verifies the emission of the wireless intelligent terminal from the received signal waveform againFrequency fingerprint RFFc(M3) If the verification is unsuccessful, the login of the wireless intelligent terminal is refused; if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server;
message M3The verification method of (1) is as follows:
calculating parameters
Figure FDA0002259189390000025
If the parameter M3' and M3If the two are equal, the verification is successful, otherwise, the verification fails.
2. The system according to claim 1, wherein the system is used in the wireless intelligent terminal access authentication method based on the radio frequency fingerprint, and is characterized in that: the system comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user;
the server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result;
and the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.
CN201711112106.0A 2017-11-13 2017-11-13 Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint Active CN107612949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711112106.0A CN107612949B (en) 2017-11-13 2017-11-13 Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711112106.0A CN107612949B (en) 2017-11-13 2017-11-13 Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint

Publications (2)

Publication Number Publication Date
CN107612949A CN107612949A (en) 2018-01-19
CN107612949B true CN107612949B (en) 2020-03-24

Family

ID=61086384

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711112106.0A Active CN107612949B (en) 2017-11-13 2017-11-13 Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint

Country Status (1)

Country Link
CN (1) CN107612949B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108551674B (en) * 2018-03-16 2020-07-31 南京东科优信网络安全技术研究院有限公司 Wireless network access safety protection system and method based on device physical fingerprint characteristics
CN108449339B (en) * 2018-03-16 2020-07-31 南京东科优信网络安全技术研究院有限公司 Wired network access security protection system and method based on device physical fingerprint characteristics
CN112543252B (en) * 2020-10-22 2021-10-26 重庆恢恢信息技术有限公司 Work method for capturing construction site behavior image data based on block chain
CN114297615B (en) * 2022-03-09 2022-05-20 上海物骐微电子有限公司 Identity authentication method, device, equipment and storage medium
CN114501452A (en) * 2022-03-31 2022-05-13 深圳博纳移动信息技术有限公司 Access management method and system for multi-type hardware equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103078741B (en) * 2013-01-07 2016-04-20 南通大学 A kind of RFID bidirectional identification protocol method
US9485267B2 (en) * 2014-06-02 2016-11-01 Bastille Networks, Inc. Anomalous behavior detection using radio frequency fingerprints and access credentials
CN105516201B (en) * 2016-01-20 2018-10-23 陕西师范大学 Lightweight anonymous authentication and cryptographic key negotiation method under a kind of environment of multi-server
CN107070949B (en) * 2017-05-24 2020-05-05 江苏大学 Vehicle-mounted network lightweight identity authentication protocol design method based on device fingerprints

Also Published As

Publication number Publication date
CN107612949A (en) 2018-01-19

Similar Documents

Publication Publication Date Title
CN107612949B (en) Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint
CN105828332B (en) improved method of wireless local area network authentication mechanism
CN102685749B (en) Wireless safety authentication method orienting to mobile terminal
CN111935714B (en) Identity authentication method in mobile edge computing network
CN105282179B (en) A method of family's Internet of Things security control based on CPK
TWI632798B (en) Server, mobile terminal, and network real-name authentication system and method
CN103297403A (en) Method and system for achieving dynamic password authentication
CN112396735B (en) Internet automobile digital key safety authentication method and device
CN107733636B (en) Authentication method and authentication system
CN110278084B (en) eID establishing method, related device and system
US10091189B2 (en) Secured data channel authentication implying a shared secret
CN109716725B (en) Data security system, method of operating the same, and computer-readable storage medium
CN110995710A (en) Smart home authentication method based on eUICC
CN113572765B (en) Lightweight identity authentication key negotiation method for resource-limited terminal
CN104754571A (en) User authentication realizing method, device and system thereof for multimedia data transmission
CN115001841A (en) Identity authentication method, identity authentication device and storage medium
CN113595985A (en) Internet of things security cloud platform implementation method based on state cryptographic algorithm security chip
CN103152326A (en) Distributed authentication method and authentication system
KR101348079B1 (en) System for digital signing using portable terminal
CN107786978B (en) NFC authentication system based on quantum encryption
KR101308498B1 (en) authentification method based cipher and smartcard for WSN
CN103179564B (en) Based on the network application login method of mobile terminal authentication
CN112383401B (en) User name generation method and system for providing identity authentication service
CN105873059A (en) United identity authentication method and system for power distribution communication wireless private network
KR20120122185A (en) Voice one-time password based user authentication method and system on smart phone

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant