CN107612949B - Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint - Google Patents
Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint Download PDFInfo
- Publication number
- CN107612949B CN107612949B CN201711112106.0A CN201711112106A CN107612949B CN 107612949 B CN107612949 B CN 107612949B CN 201711112106 A CN201711112106 A CN 201711112106A CN 107612949 B CN107612949 B CN 107612949B
- Authority
- CN
- China
- Prior art keywords
- intelligent terminal
- server
- wireless intelligent
- authentication
- radio frequency
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a wireless intelligent terminal access authentication method and a wireless intelligent terminal access authentication system based on radio frequency fingerprints, wherein the method comprises the following steps: s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal; s2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result. The invention provides a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints, which can realize mutual authentication between a wireless intelligent terminal and a server, reduce the complexity of identity authentication of a mobile intelligent terminal and improve the safety of identity authentication.
Description
Technical Field
The invention relates to the field of wireless intelligent terminal equipment access authentication, in particular to a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints.
Background
With the rapid development of mobile internet technology and the change of mobile terminals, various mobile terminals such as smart phones and tablet computers have penetrated into daily life and work, and especially have a wide application prospect in the aspects of emerging internet of things and cloud computing. However, the performance of the mobile intelligent terminal is limited due to the cost limitation, and the open mobile wireless network itself has many risks, and is vulnerable to intrusion by hackers or illegal users and other attacks, such as cloning, replay, impersonation, eavesdropping, tampering, denial of service attack, and the like. Identity authentication of two communication parties is the basis and key of information security and privacy protection, and once an identity authentication system is damaged, the system has no security.
The traditional authentication system is implemented based on a cryptographic system and a security protocol, that is, two communication parties verify the validity of the identities of each other by means of interaction of challenge and response according to secret information shared in advance. Common identity authentication modes mainly comprise static password authentication, one-time password authentication, digital certificate-based identity authentication and hardware equipment-based identity authentication. But their application has certain limitations. Compared with the traditional PC identity authentication, the identity authentication of the mobile intelligent terminal has some differences, such as: the mobile intelligent terminal has limited calculation and storage capacity and limited energy consumption, is not suitable for adopting a complex encryption algorithm, and needs to avoid frequent communication times and the like. Therefore, a safe identity authentication scheme suitable for the mobile intelligent terminal communication system needs to be designed.
In recent years, a non-password authentication technology based on physical layer information is proposed for information security and privacy protection of wireless devices, and the non-password authentication mode has the characteristics of higher security performance and low complexity. Radio Frequency Fingerprint (RFF) based radio transmission device identification and verification is one of the non-password authentication techniques. The technology carries out waveform extraction on a received radio signal carrying hardware information of radio transmitting equipment to obtain an RFF, wherein the RFF embodies the unique characteristic of the hardware of the radio transmitting equipment; the main reason for the RFF is the tolerance phenomenon of the electronic components of the wireless transmitter. Component tolerances result in the system properties not being exactly the same even if the structure of the radio transmitting part is the same as the component nominal value; in the radio frequency band, small component difference can also cause great difference of radio frequency signals, so that the unique identification of the electronic equipment through the RFF is feasible; and the RFF-based authentication fully utilizes the hardware characteristics of the terminal, almost does not need additional calculation and has low complexity.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a wireless intelligent terminal access authentication method and system based on radio frequency fingerprints, which can realize mutual authentication between a wireless intelligent terminal and a server, reduce the complexity of identity authentication of the wireless intelligent terminal and improve the safety of identity authentication.
The purpose of the invention is realized by the following technical scheme: a wireless intelligent terminal access authentication method based on radio frequency fingerprints comprises the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal; specifically, the step S1 includes the following sub-steps: s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function; s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server; s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS; s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists: if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal; if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished; and S105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration.
S2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result. Specifically, the step S2 includes the following sub-steps: s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0; s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the wireless intelligent terminal from the received signal waveformRadio frequency fingerprint RFFc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database: if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected; if yes, go to step S203; s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID: if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID); if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2The step (S) includes encrypted password information (CS), random number information (PS) (new), and shared secret value information (K), and the step (S204) is proceeded; s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal: if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server; if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3(ii) a S205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification: if message M3If the verification fails, the server refuses the login of the wireless intelligent terminal; if message M3After the verification is successful, the server extracts and verifies the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveform againc(M3) If the verification is unsuccessful, the login of the wireless intelligent terminal is refused; and if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server.
Preferably, in step S104, the server determines whether the user already exists as follows: and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered to exist.
A wireless intelligent terminal access authentication system based on radio frequency fingerprints comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user;
the server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result;
and the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.
The invention has the beneficial effects that: the method is efficient, flexible and independent of a third party, the server side has the function of extracting and identifying the radio frequency fingerprint when receiving the signal, and the mobile intelligent terminal does not need to add extra hardware, so that the complexity and the expense of the mobile intelligent terminal are reduced, common attacks such as cloning, replaying, counterfeiting and the like can be resisted, the anonymity requirement of the mobile intelligent terminal is met, mutual authentication between the intelligent terminal and the server is realized, the complexity of identity authentication of the mobile intelligent terminal is reduced, and the safety of identity authentication is improved.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a flow chart of the present invention for performing initial registration entry;
FIG. 3 is a flow chart of the present invention for performing a login authentication;
fig. 4 is a schematic block diagram of the system of the present invention.
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in fig. 1, a wireless intelligent terminal access authentication method based on radio frequency fingerprint includes the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal;
s2, operating login authentication: when a user requests to log in the server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result.
As shown in fig. 2, the step S1 includes the following sub-steps:
s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function;
s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server;
s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS;
s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists:
if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal;
if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished;
and S105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration.
In the embodiment of the present application, in the step S104, the server determines whether the user already exists as follows: and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered to exist.
As shown in fig. 3, the step S2 includes the following sub-steps:
s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0;
s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveformc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database:
if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected;
if yes, go to step S203;
s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID:
if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID);
if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2The step (S) includes encrypted password information (CS), random number information (PS) (new), and shared secret value information (K), and the step (S204) is proceeded;
in an embodiment of the present application, the verification message M2Comprising P, W two parameters, wherein:
s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal:
if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server;
if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3;
In this embodiment, for the authentication message M2The verification method of (1) is as follows:
the parameter CS' ═ h (pw) is calculated, if the parameter W 'is equal to W, the authentication is successful, otherwise, the authentication is failed, and the updated ID is equal to PS'; authentication message M sent again to the server3Comprises the following steps:
s205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification:
in this embodiment, message M3The verification method of (1) is as follows:
calculating parametersIf the parameter M3' and M3If the two are equal, the verification is successful, otherwise, the verification fails.
If message M3If the verification fails, the server refuses the login of the wireless intelligent terminal;
if message M3Is verified asAnd the server extracts and verifies the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveform againc(M3) Verifying, and if the verification is unsuccessful, refusing the login of the wireless intelligent terminal; and if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server.
All symbols in the above embodimentsAll represent exclusive or operators; all symbols "|", denote the join operator.
A wireless intelligent terminal access authentication system based on radio frequency fingerprints comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user; in an embodiment of the present application, the wireless smart terminal includes: the registration module is used for inputting a registration password by a user, encrypting the registration password, transmitting the encrypted registration password to the server and storing a shared secret value generated by the server; and the login module is used for inputting a login password by a user and completing bidirectional authentication with the server.
The server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result; in an embodiment of the present application, the server includes: the registration entry module is used for extracting the radio frequency fingerprint of the wireless intelligent terminal initiating the registration request, generating a shared secret value and transmitting the shared secret value to the wireless intelligent terminal, and storing the registration password of the user, the radio frequency fingerprint of the wireless intelligent terminal and the shared secret value as initial registration entry information in a database; and the access authentication module interacts with the wireless intelligent terminal to complete bidirectional interactive authentication according to the radio frequency fingerprint of the wireless intelligent terminal, the login password and the initialized entry information in the database during login when a user initiates a login request.
And the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.
Claims (2)
1. A wireless intelligent terminal access authentication method based on radio frequency fingerprint is characterized in that: the method comprises the following steps:
s1, initializing, registering and inputting: the wireless intelligent terminal encrypts a registration password input by a user and transmits the encrypted registration password to the server, initiates a registration request to the server, and the server completes initialization registration entry according to the encrypted password and the radio frequency fingerprint of the wireless intelligent terminal;
s2, operating login authentication: when a user requests to log in a server, bidirectional legality authentication between the wireless intelligent terminal and the server is carried out according to the initialized registration input information, and the conversation on-off of the wireless intelligent terminal and the server is managed according to an authentication result;
the step S1 includes the following sub-steps:
s101, a user inputs a password PW to a wireless intelligent terminal, and the wireless intelligent terminal encrypts the input password to obtain an encrypted password CS (H) (PW), wherein H (PW) represents that the input password PW is encrypted and calculated by using a Hash function;
s102, the wireless intelligent terminal transmits the encrypted password CS to a server and sends a registration request Reg to the server;
s103, the server extracts a radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveforms of the registration request Reg and the encryption password CS;
s104, the server verifies the radio frequency fingerprint RFF of the wireless intelligent terminal and judges whether the user already exists:
if the user does not exist, generating a shared secret value K, then storing the encryption password CS, the radio frequency fingerprint RFF and the shared secret value K in a database, and sending the shared secret value K to the wireless intelligent terminal;
if the user exists, the existing notification information of the user is fed back to the wireless intelligent terminal, and the registration is finished;
s105, after receiving the shared secret value K, the wireless intelligent terminal stores the shared secret value K, sends an acknowledgement message Ack to the server and finishes registration;
in step S104, the process of the server determining whether the user already exists is as follows: if the radio frequency fingerprint RFF of the wireless intelligent terminal already exists in the current database, the user is considered to exist, and if the radio frequency fingerprint RFF of the wireless intelligent terminal does not exist in the current database, the user is considered not to exist;
the step S2 includes the following sub-steps:
s201, when a user requests to log in a server, a password PW is input through a wireless intelligent terminal, and then a login request message M is generated1And sending the request message M to a server1The ID information is initialized to default to 0;
s202, the server verifies the validity of the wireless intelligent terminal, and the server firstly extracts the radio frequency fingerprint RFF of the wireless intelligent terminal from the received signal waveformc(M1) Then, the RFF is judgedc(M1) Whether or not it exists in the database:
if the wireless intelligent terminal does not exist, the session between the server and the wireless intelligent terminal is disconnected;
if yes, go to step S203;
s203, searching for radio frequency fingerprints RFF in databasec(M1) Generating a new random number PS (new) by utilizing a pseudo-random generation algorithm, calculating and judging whether H (PS (new)) is equal to H (ID), wherein H (PS (new)) represents a Hash calculation result of the random number PS (new), and H (ID) represents a Hash calculation result of the ID:
if H (PS (new)) is equal to H (ID), regenerating new PS (new), returning to step S203 to judge again whether H (PS (new)) is equal to H (ID);
if H (PS) (new)) is not equal to H (ID), sending a verification message M to the wireless intelligent terminal2Verification message M2Includes encrypted cryptographic information CS, random number information ps (new), and shared secret value information K,entering step S204;
the verification message M2Comprising P, W two parameters, wherein:
h () represents a hash operation;representing an exclusive or operator; all symbols "|" represent the join operator;
s204, the wireless intelligent terminal receives the authentication message M sent by the server2Then, for M2Verifying and judging whether the server is legal:
if the verification fails, the server is considered to be illegal, and the wireless intelligent terminal disconnects the session with the server;
if the verification is successful, the wireless intelligent terminal updates the ID and sends a verification message M to the server again3;
For authentication message M2The verification method of (1) is as follows:
the parameter CS' ═ h (pw) is calculated,if the parameter W 'is equal to W, the authentication is successful, otherwise, the authentication is failed, and the updated ID is equal to PS'; authentication message M sent again to the server3Comprises the following steps:
s205, the server verifies the validity of the wireless intelligent terminal again, and the server receives M3Then, to message M3And (4) carrying out verification:
if message M3If the verification fails, the server refuses the login of the wireless intelligent terminal;
if message M3After the verification is successful, the server extracts and verifies the emission of the wireless intelligent terminal from the received signal waveform againFrequency fingerprint RFFc(M3) If the verification is unsuccessful, the login of the wireless intelligent terminal is refused; if the verification is successful, sending a confirmation message to the wireless intelligent terminal, finishing the authentication, and successfully accessing the wireless intelligent terminal to the server;
message M3The verification method of (1) is as follows:
2. The system according to claim 1, wherein the system is used in the wireless intelligent terminal access authentication method based on the radio frequency fingerprint, and is characterized in that: the system comprises a wireless intelligent terminal, a server and a database; the wireless intelligent terminal is connected with the server through a wireless network, and the server is connected with the database;
the wireless intelligent terminal is used for registering and logging in a server by a user;
the server is used for interacting with the wireless intelligent terminal, finishing initialization registration entry of a user based on the radio frequency fingerprint, performing bidirectional access authentication with the wireless intelligent terminal according to the initialization registration entry information of the user, and managing the on-off of a session between the wireless intelligent terminal and the server according to an authentication result;
and the database is used for storing the initial registration input information of the user for access authentication between the server and the wireless intelligent terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711112106.0A CN107612949B (en) | 2017-11-13 | 2017-11-13 | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711112106.0A CN107612949B (en) | 2017-11-13 | 2017-11-13 | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107612949A CN107612949A (en) | 2018-01-19 |
CN107612949B true CN107612949B (en) | 2020-03-24 |
Family
ID=61086384
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711112106.0A Active CN107612949B (en) | 2017-11-13 | 2017-11-13 | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107612949B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108551674B (en) * | 2018-03-16 | 2020-07-31 | 南京东科优信网络安全技术研究院有限公司 | Wireless network access safety protection system and method based on device physical fingerprint characteristics |
CN108449339B (en) * | 2018-03-16 | 2020-07-31 | 南京东科优信网络安全技术研究院有限公司 | Wired network access security protection system and method based on device physical fingerprint characteristics |
CN112543252B (en) * | 2020-10-22 | 2021-10-26 | 重庆恢恢信息技术有限公司 | Work method for capturing construction site behavior image data based on block chain |
CN114297615B (en) * | 2022-03-09 | 2022-05-20 | 上海物骐微电子有限公司 | Identity authentication method, device, equipment and storage medium |
CN114501452A (en) * | 2022-03-31 | 2022-05-13 | 深圳博纳移动信息技术有限公司 | Access management method and system for multi-type hardware equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103078741B (en) * | 2013-01-07 | 2016-04-20 | 南通大学 | A kind of RFID bidirectional identification protocol method |
US9485267B2 (en) * | 2014-06-02 | 2016-11-01 | Bastille Networks, Inc. | Anomalous behavior detection using radio frequency fingerprints and access credentials |
CN105516201B (en) * | 2016-01-20 | 2018-10-23 | 陕西师范大学 | Lightweight anonymous authentication and cryptographic key negotiation method under a kind of environment of multi-server |
CN107070949B (en) * | 2017-05-24 | 2020-05-05 | 江苏大学 | Vehicle-mounted network lightweight identity authentication protocol design method based on device fingerprints |
-
2017
- 2017-11-13 CN CN201711112106.0A patent/CN107612949B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN107612949A (en) | 2018-01-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107612949B (en) | Wireless intelligent terminal access authentication method and system based on radio frequency fingerprint | |
CN105828332B (en) | improved method of wireless local area network authentication mechanism | |
CN102685749B (en) | Wireless safety authentication method orienting to mobile terminal | |
CN111935714B (en) | Identity authentication method in mobile edge computing network | |
CN105282179B (en) | A method of family's Internet of Things security control based on CPK | |
TWI632798B (en) | Server, mobile terminal, and network real-name authentication system and method | |
CN103297403A (en) | Method and system for achieving dynamic password authentication | |
CN112396735B (en) | Internet automobile digital key safety authentication method and device | |
CN107733636B (en) | Authentication method and authentication system | |
CN110278084B (en) | eID establishing method, related device and system | |
US10091189B2 (en) | Secured data channel authentication implying a shared secret | |
CN109716725B (en) | Data security system, method of operating the same, and computer-readable storage medium | |
CN110995710A (en) | Smart home authentication method based on eUICC | |
CN113572765B (en) | Lightweight identity authentication key negotiation method for resource-limited terminal | |
CN104754571A (en) | User authentication realizing method, device and system thereof for multimedia data transmission | |
CN115001841A (en) | Identity authentication method, identity authentication device and storage medium | |
CN113595985A (en) | Internet of things security cloud platform implementation method based on state cryptographic algorithm security chip | |
CN103152326A (en) | Distributed authentication method and authentication system | |
KR101348079B1 (en) | System for digital signing using portable terminal | |
CN107786978B (en) | NFC authentication system based on quantum encryption | |
KR101308498B1 (en) | authentification method based cipher and smartcard for WSN | |
CN103179564B (en) | Based on the network application login method of mobile terminal authentication | |
CN112383401B (en) | User name generation method and system for providing identity authentication service | |
CN105873059A (en) | United identity authentication method and system for power distribution communication wireless private network | |
KR20120122185A (en) | Voice one-time password based user authentication method and system on smart phone |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |