CN107770126A - Personal identification method, system and dynamic token, mobile terminal, gateway device - Google Patents
Personal identification method, system and dynamic token, mobile terminal, gateway device Download PDFInfo
- Publication number
- CN107770126A CN107770126A CN201610676231.3A CN201610676231A CN107770126A CN 107770126 A CN107770126 A CN 107770126A CN 201610676231 A CN201610676231 A CN 201610676231A CN 107770126 A CN107770126 A CN 107770126A
- Authority
- CN
- China
- Prior art keywords
- password
- mobile terminal
- gateway device
- dynamic token
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/2803—Home automation networks
- H04L12/283—Processing of data at an internetworking point of a home automation network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a kind of personal identification method, system and dynamic token, mobile terminal, gateway device, the password of acquisition for mobile terminal first, first password is disposable information, for being verified to the identity of mobile terminal, mobile terminal sends access request to gateway device, and the first password is carried in access request, gateway device obtains access request, first password is verified, after being verified, mobile terminal conducts interviews to smart machine.By the implementation of the present invention, the authentication of mobile terminal accessing smart machine is realized, ensure that security, improves Consumer's Experience.
Description
Technical field
It is whole more specifically to a kind of personal identification method, system and movement the present invention relates to smart home field
End, gateway device.
Background technology
With the rise of Intelligent hardware, thousands of smart home product is applied in the daily life of the mankind.People
Can pass through intelligent terminal APP and realize remote access and control to intelligent home device.Existing domestic intelligent gateway solution
Certainly in scheme, the identity for accessing user is not identified for major part and certification, domestic intelligent equipment are present by unauthorized access
Risk.For a user, how to ensure the implementation network ID authentication of access safety and can low cost, be to need what is solved to ask
Topic.
The content of the invention
The technical problem to be solved in the present invention is how to realize the authentication for accessing user, for the technical problem,
A kind of personal identification method, system and mobile terminal, gateway device are provided.
In order to solve the above technical problems, the present invention provides a kind of personal identification method, including a kind of password generated method, institute
Stating password generated method includes:
Dynamic token and gateway device exchange key message;
Using the key message that the dynamic token and gateway device exchange as operational factor, according to the computing because
Son the first password of generation;First password is disposable information, for being verified to the identity of mobile terminal.
Optionally, the password generated method also includes:User name is set together with the dynamic token with the gateway
Standby binding.
Optionally, the dynamic token and gateway device exchange key message and included:By unique sequence of the dynamic token
The random number that row number generates with the gateway device swaps.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The first password of dynamic token generation is obtained, first password is disposable information, for mobile terminal
Identity is verified;
Access request is sent to gateway device, first password is carried in the access request;
After being verified, smart machine is conducted interviews.
Optionally, first password passes through at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm
Algorithm generates.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The access request that mobile terminal is sent is obtained, carries the first password in the access request, first password is
Disposable information, for being verified to the identity of the mobile terminal;
First password is verified;
After being verified, access rights of the mobile terminal to the smart machine are assigned.
Optionally, it is described first password is verified before, in addition to:Generate the second password;Second password
Generated with first password by same algorithm;
It is described checking is carried out to the first password to include:Checking is compared with first password in second password,
When second password and consistent the first password, it is verified.
Optionally, the second password of the generation includes:Using the identical algorithm and operational factor of agreement, second mouthful is generated
Order;Or detection generates the algorithm of first password, according to identical operational factor, the second password is generated.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The password of acquisition for mobile terminal first, first password is disposable information, for entering to the identity of mobile terminal
Row checking;
The mobile terminal sends access request to gateway device, and first password is carried in the access request;
Gateway device obtains the access request, and first password is verified;
After being verified, the mobile terminal conducts interviews to the smart machine.
In order to solve the above technical problems, the present invention also provides a kind of dynamic token, including safety chip and communication unit, institute
State safety chip and generate the first password, and first password is sent to by mobile terminal by communication unit;The first
Make as disposable information, for being verified to the identity of the mobile terminal.
Optionally, the dynamic token also includes power supply module, for being powered to the dynamic token, described in preservation
The operational factor needed for generation first password in safety chip.
Optionally, the operational factor includes the key message and gateway device of the UTC time factor and dynamic token
Key message, the algorithm include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm algorithm.
In order to solve the above technical problems, the present invention also provides a kind of mobile terminal, including:
Password acquisition module, for obtaining the first password of dynamic token generation, first password is disposable information,
For being verified to the identity of mobile terminal;
Initiation module is accessed, for sending access request to gateway device, the first is carried in the access request
Order;
Access modules, for after being verified, being conducted interviews to smart machine.
In order to solve the above technical problems, the present invention also provides a kind of gateway device, including:
Acquisition module is accessed, for obtaining the access request of mobile terminal transmission, first is carried in the access request
Order, first password is disposable information, for being verified to the identity of the mobile terminal;
Authentication module, for being verified to first password;
Authority assigns module, for after being verified, assigning access right of the mobile terminal to the smart machine
Limit.
Optionally, in addition to for generate the second password the second command generation module;The authentication module is additionally operable to:Will
Checking is compared with first password in second password;Second password is generated with the first password by same algorithm.
Optionally, second command generation module is additionally operable to:Detection generates the algorithm of first password, and according to phase
The second password is generated with algorithm and operational factor;
Or, identical algorithm and operational factor according to agreement, generate the second password.
In order to solve the above technical problems, the present invention also provides a kind of identification system, including dynamic token as the aforementioned,
Mobile terminal, gateway device, and the smart machine being connected with the gateway device.
Optionally, the system also includes binding module, for the dynamic token and the gateway device to be tied up
It is fixed.
Optionally, the binding module is also used, the dynamic token and the gateway device is exchanged key message,
The two is set to form binding relationship;The dynamic token generates the first password according to the key message;First password is one
Secondary property information, for being verified to the identity of the mobile terminal.
Optionally, the dynamic token is arranged at least one of terminal shell/set, key, ornament carry-on articles, or collection
Into at least one of intelligent watch, Intelligent bracelet, intelligent jewellery wearable device.
Beneficial effect
It is mobile whole the invention provides a kind of personal identification method, system and dynamic token, mobile terminal, gateway device
End obtains the first password, and the first password is disposable information, and for being verified to the identity of mobile terminal, mobile terminal is to net
Close equipment and send access request, the first password is carried in access request, gateway device obtains access request, and the first password is carried out
Checking, after being verified, mobile terminal conducts interviews to smart machine.By the implementation of the present invention, mobile terminal is realized
The authentication of smart machine is accessed, security is ensure that, improves Consumer's Experience.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is a kind of personal identification method schematic flow sheet that first embodiment of the invention provides;
Fig. 2 is a kind of password generated method flow schematic diagram that first embodiment of the invention provides;
Fig. 3 is a kind of personal identification method schematic flow sheet that second embodiment of the invention provides;
Fig. 4 is the schematic flow sheet that the dynamic token that second embodiment of the invention provides exchanges information with gateway device;
Fig. 5 is a kind of personal identification method schematic flow sheet that third embodiment of the invention provides;
Fig. 6 is the first password and the second password computing schematic diagram that second embodiment of the invention provides;
Fig. 7 is a kind of composition schematic diagram for dynamic token that fourth embodiment of the invention provides;
Fig. 8 is a kind of mobile terminal composition schematic diagram that fifth embodiment of the invention provides;
Fig. 9 is a kind of composition schematic diagram for gateway device that sixth embodiment of the invention provides;
Figure 10 is a kind of composition schematic diagram for identification system that seventh embodiment of the invention provides.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The specific design of the present invention is that acquisition for mobile terminal is disposable, available for the identity for verifying mobile terminal
First password, the connected gateway device of smart machine is conveyed by first password mobile terminal is verified, be verified
Afterwards, mobile terminal can be made to conduct interviews smart machine, avoids the unprotected can of mobile terminal and arbitrarily visited
Operation is asked, the security of system is ensure that, improves Consumer's Experience.
It is described in detail below by way of specific embodiment.
First embodiment
Reference picture 1, Fig. 1 are the personal identification method schematic flow sheet that first embodiment of the invention provides.
S101, the first password for obtaining dynamic token generation, the first password is disposable information, for mobile terminal
Identity is verified;
S102, to gateway device access request is sent, carry the first password in access request;
S103, after being verified, smart machine is conducted interviews.
The mode of existing mobile terminal accessing smart machine, login interface is set usually at mobile terminal, with hard
The mode of part or software, there are account and password or logged in without account and the form of password, then can passes through mobile whole
End operates to smart machine.However, although this access mode might have the protection of account password, however, account is close
The ease for use of code, which then result in, to be easy for revealing, and if once revealing, other users can is very easily to intelligence
Equipment conducts interviews, so as to bring potential safety hazard.
The first password in the present embodiment is a disposable information, and it is generated based on unique operational factor, is had not
Invertibity and non-repeatability, each first password and the first password afterwards are different, and avoiding problems by other users
Stolen;First password can be used for being verified for the identity of mobile terminal, judge whether mobile terminal has permission to access intelligence
Can equipment.When mobile terminal attempts to access that smart machine, first password is obtained, is then initiated by first password to intelligence
The access request of energy equipment.
Interaction between smart machine and mobile terminal, it can not be directly, smart machine would generally be set by gateway
It is standby to interact, including the access point apparatus of the Intranet of smart machine and outer net, sometimes the equipment can be router, sometimes
It can be then the autonomous device that network connection be present with router to wait.It can be realized between smart machine by gateway device mutual
Interaction, interacting between the other equipment of outer net can also be realized by gateway device.Mobile terminal can pass through internet
Interact with gateway device, so as to realize the network connection between smart machine, smart machine is conducted interviews.
The generation of first password, generated by the dynamic token outside mobile terminal.Can be by wireless in mobile terminal
Connected mode, such as Wifi (WIreless-Fidelity, Wireless Fidelity), Zigbee (ZigBee protocol), IrDA (Infrared
Data Association, infrared connection technology), the radio connection such as Bluetooth (bluetooth), to obtain dynamic token life
Into the first password, wherein Bluetooth radio connection is applied widely, and power consumption is relatively low, conduct in the present embodiment
One preferably scheme can be carried out;The dynamic token can be by symmetric cryptographic algorithm, open code algorithm, hash algorithm
At least one algorithm generate the first password.Wherein, symmetric cryptographic algorithm, such as DES/3DES, AES, SM4, hash algorithm,
Such as SHA-1, SHA-256, SM3, it is however generally that, these algorithms take one in a dynamic token, different
Its algorithm of dynamic token can also be different, and algorithm is different, and its first password generated also can be different.
Fig. 2 is refer to, the generation method of dynamic password is as follows:
S201, dynamic token and gateway device exchange key message;
S202, the key message for exchanging dynamic token and gateway device generate as operational factor according to operational factor
First password, the first password is disposable information, for being verified to the identity of mobile terminal.
In addition, this method can also include:User name is bound together with dynamic token with gateway device.
Dynamic token, which exchanges key message with gateway device, can then include:By the unique sequence numbers and gateway of dynamic token
The random number of equipment generation swaps.
Operational factor included by the generation of first password can include:UTC time (Universal Time
Coordinated, Coordinated Universal Time(UTC)), the unique sequence numbers of dynamic token and dynamic token and gateway device be when binding, net
Close equipment and be supplied to seed key of dynamic token etc..These operational factors are stored in dynamic token safety chip, raw
Into the first password there is uniqueness.Below, by taking hash algorithm SM3 as an example, the generating process of the first password is as follows:
T=Tu/Tc
ID=T | Q }
S=F (K, ID)
OD=Truncate (S)
P1=OD% (10^N)
T is the time factor for participating in computing, and Tu is the UTC time write during production, and Tc is the password change with second unit
In the cycle, its maximum length can be set as 60S, or other times.ID is hash algorithm input information, and Q is dynamic token
Unique sequence numbers.K is the seed key that the dynamic token is supplied to by the gateway device, and F is the algorithmic function used,
SM3 algorithms are corresponded in this example.Truncate is cut position function, and OD is its output result.N is the password digit ultimately generated,
It is required that not less than 6.P1 is then the first password ultimately generated.According to this algorithmic procedure, it can be seen that UTC time, dynamic
Unique sequence numbers, the gateway device of token are supplied to the seed key of dynamic token, and any at least one parameter among these has
Institute is different, and the first final password is all different.
In the present embodiment, dynamic token can include safety chip, communication unit, physical button and power supply module, its
In, safety chip can realize the generation of the first password by various algorithms;Communication unit can then allow dynamic token and movement
Terminal, gateway device realize communication connection, provide the first password for mobile terminal, are bound with gateway device;Physical button
Machine open/close etc. basic function can be then provided the user, or the Premium Features such as confirmation can also be provided;Power supply module is then
Power, can be powered by dry cell, button cell etc. for dynamic token, typically dynamic token can be
3-5 is used under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token power supply.Dynamic token
Physical form on can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories, can also be integrated in can
In wearable device, such as intelligent watch, Intelligent bracelet.
Mobile terminal in the present embodiment, include but is not limited to:Smart mobile phone, tablet personal computer and other portable intelligents are worn
Wear equipment, such as Intelligent bracelet, intelligent watch;By the mobile terminal of checking, the management list in mobile terminal can be passed through
Member, such as application program, logging in gateway equipment, check, manage intelligent home device, encryption and decryption transmission data.Gateway device and intelligence
It can be then connected between home equipment by way of a variety of wireless and/or wired connections, as the present embodiment is aforementioned
The radio connections such as Wifi, Zigbee, IrDA, Bluetooth, or pass through the wired connection modes such as broadband connection.
A kind of personal identification method is present embodiments provided, obtains the first password, initiates to set intelligence by the first password
Standby access request, after being verified, smart machine is conducted interviews;Pass through the implementation of the present embodiment, it is possible to achieve mobile whole
End accesses the authentication of smart machine, ensure that interaction safety, improves Consumer's Experience.
Second embodiment
Reference picture 3, Fig. 3 are the personal identification method schematic flow sheet that second embodiment of the invention provides.
S301, the access request that mobile terminal is sent is obtained, the first password is carried in access request, the first password is once
Property information, for being verified to the identity of mobile terminal;
S302, the first password is verified;
S303, after being verified, access rights of the giving mobile terminal to smart machine.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because
Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it
His user is stolen;First password can be used for being verified for the identity of mobile terminal, and intelligence is attempted to access that in mobile terminal
During equipment, first password is obtained, the access request to smart machine is then initiated by first password.
Smart machine is connected with gateway device, the access request to smart machine that mobile terminal is initiated by the first password
It can then be handled by gateway device.First password is verified, checking be the first password legitimacy, that is, move
Whether the first password that terminal provides has the authority for accessing smart machine.Specifically, in the present embodiment, enter to the first password
Before row checking, it can also include:Generate the second password;Second password is generated with the first password by same algorithm, and the
The generation time of one password and the second password matches;Carrying out checking to the first password can include:When the second password and first
When password is consistent, it is verified.
Similar with the first password, the second password can be generated by way of hardware or software, and the generation of the second password
Algorithm can include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm etc., wherein, symmetric cryptography
Algorithm, such as DES/3DES, AES, SM4, such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, in gateway
In equipment, these algorithms can exist simultaneously, and this is to adapt to the algorithms of different transmitted by each different mobile terminal
The first password;With in the dynamic token of gateway device binding, each dynamic token can take different algorithms to generate the
One password, accordingly, gateway device should then include the algorithm of the dynamic token of all bindings, and it is suitable thus to provide
Second password and the first password carry out contrast verification.
The operation time of first password is write when dynamic token produces and processes by external equipment, the computing of the second password
Time is then directly obtained by gateway device from Internet;Dynamic token and the equal built-in security chip of gateway device, not only possess
RTC clocking capabilitys, and can be with securely held operational factor.In general, the time referred herein is all the standard time, i.e.,
UTC time, the time of the first password and the time of the second password should have consistent feelings in the time range of some permission
Condition.For example, if the generation time interval of the first password and the second password is one minute, i.e., the first password in each minute is one
Cause, such as in UTC time 2016.6.6 12:00:00 arrives 2016.6.6 12:01:In 00 this minute, the first password is D11,
The time range of permission is ± 2 minutes/year, then it is meant that gateway device end the second password respectively in UTC time
2016.6.6 11:58:00 arrives 2016.1.1 12:03:00 in this five minutes, and one meets together and produces five the second passwords, is respectively
D21, D22, D23, D24, D25, want D11 identical with any one in D21, D22, D23, D24, D25, then it is assumed that first
Order and the second password match.Second password corresponding to being generated due to polyalgorithm can be included in gateway device, then, generation
Second password can then include:The algorithm of detection the first password of generation, and search second password consistent with its algorithm.Namely
Say, mobile terminal can also gather the generating algorithm of the first password, directly can be set with gateway in addition to gathering the first password
Checking is compared with the second password of its time match in all in standby one by one, if any one second password and this first
Password match, then be considered as fitting through.
The operational factor of second password generated, it is similar with the first password, can include UTC time, dynamic token it is unique
The seed key that sequence number, gateway device provide.First password and the second password are generated by dynamic token and gateway device respectively,
The two uses identical algorithms and operational factor, therefore has identical operation result.By taking the close hash algorithm SM3 of state as an example, the second password
Generating process is as follows:
T=Ti/Tc
ID=T | Q }
S=F (K, ID)
OD=Truncate (S)
P2=OD% (10^N)
T is the time factor for participating in computing, and Ti is the current Internet time, and Tc is to change week with the password of second unit
Phase, maximum length 60S.ID is hash algorithm input information, and Q is dynamic token unique sequence numbers.K is by the gateway device
The seed key randomly generated, F are the algorithmic function used, correspond to SM3 algorithms in this example.Truncate is cut position letter
Number, OD is its output result.N is the password digit ultimately generated, it is desirable to not less than 6.P2 is then second mouthful ultimately generated
Order.According to this algorithmic procedure, it can be seen that UTC time, the unique sequence numbers of dynamic token, gateway device are supplied to dynamic
The seed key of token, any at least one parameter among these is different, and the first final password is all different.As long as
The operational factor of the participation computing of first password and the second password is identical, and algorithm is consistent, then the first password and the second password
It just should be consistent, refer to Fig. 6, Fig. 6 shows the calculating process of the first password and the second password.
After being verified, access rights of the giving mobile terminal to smart machine.This can be referred to by assigning the authority accessed
The authority of access, the authority of the access in certain time in other words, then need to re-start checking beyond this period.
In order to form consistent operational factor, in the access to smart machine that acquisition mobile terminal is initiated by the first password
Before request, it can also include:Dynamic token and gateway device are bound, that is to say, that establish gateway device and dynamic
Corresponding relation between token.Gateway device and dynamic token are bound, i.e., when user activates dynamic token, dynamic makes
Board is exchanged with each other key message with gateway device, to reach the purpose of consistent operational factor.Key message includes but is not limited to:It is dynamic
The unique sequence numbers of state token, seed key of gateway device generation etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token
For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation
Bound with user name, finally activate gateway device, complete the exchange of key message.
In the present embodiment, gateway device is the access point apparatus of Intranet and outer net in intelligent domestic system, and sometimes this sets
Standby is router, is then sometimes the autonomous device that network connection be present with router.System manager possesses in gateway device
Portion's highest authority, it can increase or delete user and the dynamic token of binding.The composition of gateway device can include:Safe core
Piece, communication unit and power supply module, safety chip can realize data encrypting and deciphering, generating random number, safe access control, Sram
The functions such as the powered holding of data.As needed, the algorithm that safety chip can be supported includes but is not limited to:DES/3DES、AES、
The hash algorithms such as the symmetric cryptographic algorithms such as SM4, SHA-1, SHA-256, SM3, and open code algorithm.Power supply module then can be with
System including being powered for gateway device, generally it is exactly civil power, can is all units power supply in gateway device, including it is foregoing
Safety chip, communication unit etc.;Power supply module can also include standing alone as the only of the power supplies such as the safety chip in gateway device
Vertical power supply, ensure the unique sequence numbers and seed key continuous and effective of dynamic token preserved in Sram.
In addition, for more preferable security performance, gateway device and the crucial letter after dynamic token binding, preserved in Sram
Breath could be arranged to can be only used to read, and can not carry out write operation again.
A kind of personal identification method is present embodiments provided, mobile terminal is obtained and intelligence is set by what the first password was initiated
Standby access request, the first password is verified, after being verified, access rights of the giving mobile terminal to smart machine.
Pass through the implementation of the present embodiment, it is possible to achieve the authentication of mobile terminal accessing smart machine, ensure that interaction safety, lifting
Consumer's Experience.
3rd embodiment
Reference picture 5, Fig. 5 are the personal identification method flow chart that third embodiment of the invention provides.
S501, the password of acquisition for mobile terminal first, the first password is disposable information, for entering to the identity of mobile terminal
Row checking;
S502, mobile terminal send access request to gateway device, and the first password is carried in access request;
S503, gateway device obtain access request, and the first password are verified;
S504, after being verified, mobile terminal conducts interviews to smart machine.
First password is a disposable information, and it is generated based on unique operational factor.It can be used for for mobile terminal
Identity verified, when mobile terminal attempts to access that smart machine, obtain first password, then pass through first password
Initiate the access request to smart machine.First password is generated by dynamic token.The dynamic token can be calculated by symmetric cryptography
At least one of method, open code algorithm, hash algorithm algorithm generates the first password.Wherein, symmetric cryptographic algorithm, such as DES/
3DES, AES, SM4 etc., such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, these algorithms are in a dynamic
One is taken in token, its algorithm of different dynamic tokens can also be different, and algorithm is different, its first password generated
Can be different.
First password is verified, checking be the first password legitimacy, i.e., mobile terminal provide the first password
Whether there is the authority for accessing smart machine.Specifically, in the present embodiment, the process verified to the first password can wrap
Include:Checking is compared with the first password in second password;Second password is generated with the first password by same algorithm.
Similar with the first password, the second password can be generated by way of hardware or software, and the generation of the second password
Algorithm can include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm etc., wherein, symmetric cryptography
Algorithm, such as DES/3DES, AES, SM4, such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, in gateway
In equipment, these algorithms can exist simultaneously, and this is to adapt to the algorithms of different transmitted by each different mobile terminal
The first password;With in the dynamic token of gateway device binding, each dynamic token can take different algorithms to generate the
One password, accordingly, gateway device should then include the algorithm of the dynamic token of all bindings, and it is suitable thus to provide
Second password and the first password carry out contrast verification.
The operational factor of first password and the second password, it can include:UTC time, dynamic token unique sequence numbers, with
And when dynamic token and gateway device binding, seed key that gateway device provides etc..
These operational factors can be very good to make a distinction the first password of different dynamic token generations, and gateway
Corresponding the second different password in equipment can also be distinguished accordingly.
In order to form consistent operational factor, in the access to smart machine that acquisition mobile terminal is initiated by the first password
Before request, it can also include:Dynamic token and gateway device are bound, that is to say, that establish gateway device and dynamic
Corresponding relation between token.Gateway device and dynamic token are bound, i.e., when user activates dynamic token, dynamic makes
Board is exchanged with each other key message with gateway device, to reach the purpose of consistent operational factor.Key message includes but is not limited to:It is dynamic
The unique sequence numbers of state token, seed key of gateway device generation etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token
For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation
Bound with user name, finally activate gateway device, complete the exchange of key message.
After being verified, gateway device giving mobile terminal is to the access rights of smart machine, mobile terminal can pair
Smart machine conducts interviews.The authority of this visit can be referred to by assigning the authority accessed, the access in certain time in other words
Authority, then need to re-start checking beyond this period.
A kind of personal identification method is present embodiments provided, the password of acquisition for mobile terminal first, is initiated by the first password
To the access request of smart machine, gateway device obtains access request, and the first password is verified, after being verified, moves
Dynamic terminal-pair smart machine conducts interviews.Pass through the implementation of the present embodiment, it is possible to achieve the body of mobile terminal accessing smart machine
Part certification, interaction safety is ensure that, improves Consumer's Experience.
Fourth embodiment
With reference to figure 7, Fig. 7 is the composition schematic diagram for the dynamic token that fourth embodiment of the invention city provides.
Dynamic token in the present embodiment, including safety chip 1041 and communication unit 1042;Safety chip 1041 generates
First password, and the first password is sent to by mobile terminal by communication unit 1042;First password is disposable information, is used for
The identity of mobile terminal is verified.
In addition, dynamic token can also include power supply module 1043, for being powered to dynamic token, safe core is preserved
The operational factor and algorithm needed for the password of generation first in piece 1041.Safety chip 1041 be for generate the first password,
And in the generating process of the first password, operational factor and algorithm are two key elements;Wherein, when operational factor can include UTC
Between the factor and dynamic token key message and gateway device key message, algorithm can include symmetric cryptographic algorithm,
At least one of open code algorithm, hash algorithm algorithm.
Fig. 2 is refer to, the generation method of dynamic password is as follows:
S201, dynamic token and gateway device exchange key message;
S202, the key message for exchanging dynamic token and gateway device generate as operational factor according to operational factor
First password.
Operational factor included by the generation of first password can include:UTC time, dynamic token unique sequence numbers,
And when dynamic token and gateway device binding, gateway device is supplied to seed key of dynamic token etc..These computings because
Son is stored in dynamic token safety chip, and the first password of generation has a uniqueness, different tokens generated first
Password is different, and the first password that identical token generates in the different time is also different.
In the present embodiment, dynamic token 104 can include safety chip 1041, communication unit 1042, physical button 1044
And power supply module 1043, wherein, safety chip 1041 can realize the generation of the first password by various algorithms, and it is stored
There are the various information needed for the first password of generation, such as algorithm, operational factor;Communication unit 1042 can then allow dynamic token and shifting
Dynamic terminal, gateway device realize communication connection, provide the first password for mobile terminal, are bound with gateway device;Physics is pressed
Key 1044 can then provide the user machine open/close etc. basic function, or can also provide the Premium Features such as confirmation;Power supply mould
Block 1043 is powered for dynamic token, can be powered by dry cell, button cell etc., typically a dynamic
Token can use 3-5 under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token confession
Electricity.It can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories in the physical form of dynamic token, also may be used
To be integrated in wearable device, such as intelligent watch, Intelligent bracelet.
5th embodiment
Reference picture 8, Fig. 8 are the composition schematic diagram for the mobile terminal that fifth embodiment of the invention provides.
Mobile terminal 10 in the present embodiment, including:
Password acquisition module 101, for obtaining the first password, the first password is disposable information, for mobile terminal
10 identity is verified;
Initiation module 102 is accessed, for sending access request to gateway device 21, described the is carried in the access request
One password;
Access modules 103, for after being verified, being conducted interviews to smart machine.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because
Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it
His user is stolen;First password can be used for being verified for the identity of mobile terminal 10, judge whether mobile terminal 10 has
Authority accesses smart machine 22.
First password is generated by dynamic token 104;Dynamic token 104 passes through wireless and/or wired mode and movement
Terminal 10 is connected, such as Wifi, Zigbee, IrDA, Bluetooth etc. mode, come obtain that other equipment is generated first
The radio connection of password, wherein Bluetooth is applied widely, and power consumption is relatively low, more excellent as one in the present embodiment
Scheme can be carried out;Specifically, dynamic token can be by symmetric cryptographic algorithm, open code algorithm, hash algorithm
At least one algorithm generates the first password.Wherein, symmetric cryptographic algorithm, such as DES/3DES, AES, SM4, hash algorithm, such as
SHA-1, SHA-256, SM3 etc., it is however generally that, these algorithms take one in a dynamic token, and different is dynamic
Its algorithm of state token can also be different, and algorithm is different, and its first password generated also can be different.
Specifically, the operational factor included by the generation of the first password can include:UTC time, dynamic token it is unique
When sequence number and dynamic token are bound with gateway device 21, gateway device 21 is supplied to seed key of dynamic token etc..
These operational factors are stored in dynamic token safety chip, and the first password of generation has uniqueness, different tokens institute
First password of generation is different, and the first password that identical token generates in the different time is also different.
In the present embodiment, dynamic token can include safety chip, communication unit, physical button and power supply module, its
In, safety chip can realize the generation of the first password by various algorithms;Communication unit can then allow dynamic token and movement
Terminal 10, gateway device 21 realize communication connection, provide the first password for mobile terminal 10, are bound with gateway device 21;
Physical button can then provide the user machine open/close etc. basic function, or can also provide the Premium Features such as confirmation;Power supply
Module is powered for dynamic token, can be powered by dry cell, button cell etc., and typically a dynamic makes
Board can use 3-5 under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token power supply.
Can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories in the physical form of dynamic token, can also
It is integrated in wearable device, such as intelligent watch, Intelligent bracelet.
Mobile terminal 10 in the present embodiment, include but is not limited to:Smart mobile phone, tablet personal computer and other portable intelligents
Wearable device, such as Intelligent bracelet, intelligent watch;Mobile terminal 10 by checking, can be by mobile terminal 10
Administrative unit, such as application program, logging in gateway equipment 21, check, manage intelligent home device, encryption and decryption transmission data.
Password acquisition module 101, access initiation module 102 in the present embodiment, access modules 103, can specifically pass through
Processor combination communication unit in mobile terminal 10 is realized.
Sixth embodiment
Fig. 9 is refer to, Fig. 9 is the composition schematic diagram for the gateway device 21 that sixth embodiment of the invention provides.
Gateway device 21 in the present embodiment, including:
Acquisition module 211 is accessed, for obtaining the access request of the transmission of mobile terminal 10, first is carried in access request
Order, the first password is disposable information, for being verified to the identity of mobile terminal 10;
Authentication module 212, for being verified to the first password;
Authority assigns module 213, for after being verified, access right of the giving mobile terminal 10 to smart machine 22
Limit.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because
Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it
His user is stolen;First password can be used for being verified for the identity of mobile terminal 10, be attempted to access that in mobile terminal 10
During smart machine 22, first password is obtained, the access request to smart machine 22 is then initiated by first password.
Gateway device 21 is connected with smart machine 22, and the access acquisition module 211 in gateway device 21 obtains mobile terminal
10 access requests to smart machine 22 initiated.Authentication module 212 verifies that checking is the first password to the first password
Legitimacy, i.e., mobile terminal 10 provide the first password whether have access smart machine 22 authority.Specifically, this implementation
In example, in addition to for generating the second command generation module 214 of the second password;Authentication module 212 is tested the first password
The process of card can include:Checking is compared with the first password in second password;Second password passes through same with the first password
Kind algorithm generation.
Second password corresponding to being generated due to polyalgorithm can be included in gateway device 21, then, in the present embodiment
The second command generation module 214 can be also used for:The algorithm of detection the first password of generation, and search consistent with its algorithm the
Two passwords.That is, mobile terminal 10 in addition to gathering the first password, can also gather the generating algorithm of the first password,
Checking directly can be compared one by one with the second password of all and its time match in gateway device 21, as long as any one
Individual second password and first password match, then be considered as fitting through.
The operational factor of second password generated, it is similar with the first password, can include UTC time, dynamic token it is unique
The seed key that sequence number, gateway device 21 provide.First password and the second password are respectively by dynamic token and gateway device 21
Generation, the two uses identical algorithms and operational factor, therefore has identical operation result.
After being verified, access rights of the giving mobile terminal 10 to smart machine 22.Assigning the authority accessed can refer to
The authority of this visit, the authority of the access in certain time in other words, then need to re-start checking beyond this period.
In order to form consistent operational factor, obtain mobile terminal 10 by the first password initiate to smart machine 22
Before access request, it can also include:Dynamic token and gateway device 21 are bound, that is to say, that establish gateway device
Corresponding relation between 21 and dynamic token.Gateway device 21 is bound with dynamic token, i.e., activating dynamic in user makes
During board, dynamic token is exchanged with each other key message with gateway device 21, to reach the purpose of consistent operational factor.Key message bag
Include but be not limited to:Seed key that unique sequence numbers, the gateway device 21 of dynamic token generate etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token
For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation
Bound with user name, finally activate gateway device, complete the exchange of key message.
7th embodiment
Figure 10 is refer to, Figure 10 is a kind of composition schematic diagram for identification system that seventh embodiment of the invention provides.
Identification system in the present embodiment includes mobile terminal 10 and gateway device 21, and mobile terminal 10 and gateway are set
Standby 21 is similar with previous embodiment, repeats no more here.
In addition, optional, binding module can also be included in identification system, for by the first command generation module
104 are bound with gateway device 21.
Dynamic token and gateway device 21 are bound, that is to say, that establish between gateway device 21 and dynamic token
Corresponding relation.Gateway device 21 is bound with dynamic token, i.e., when user activates dynamic token, dynamic token and net
Close equipment 21 and be exchanged with each other key message, to reach the purpose of consistent operational factor.Key message includes but is not limited to:Dynamic makes
Seed key that unique sequence numbers, the gateway device 21 of board generate etc..
Fig. 4 is refer to, the process for being exchanged with each other key message of dynamic token and gateway device 21 is as follows:
S401, system manager's logging in gateway equipment 21, input the unique sequence numbers of dynamic token;
S402, gateway device 21 randomly generate the true random number of self-defined digit, and user is by the Data Enter dynamic token
As seed key, gateway device 21 then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device 21, and gateway device 21 is by unique sequence of the dynamic token of preservation
Row number is bound with user name, is finally activated gateway device 21, is completed the exchange of key message.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (20)
1. a kind of personal identification method, including a kind of password generated method, the password generated method include:
Dynamic token and gateway device exchange key message;
Using the key message that the dynamic token and gateway device exchange as operational factor, given birth to according to the operational factor
Into the first password;First password is disposable information, for being verified to the identity of mobile terminal.
2. personal identification method as claimed in claim 1, it is characterised in that the password generated method also includes:By user
Name is bound together with the dynamic token with the gateway device.
3. personal identification method as claimed in claim 1 or 2, it is characterised in that the dynamic token and gateway device exchange
Key message includes:The random number that the unique sequence numbers of the dynamic token generate with the gateway device is swapped.
4. a kind of personal identification method, including:
The first password of dynamic token generation is obtained, first password is disposable information, for the identity to mobile terminal
Verified;
Access request is sent to gateway device, first password is carried in the access request;
After being verified, smart machine is conducted interviews.
5. personal identification method as claimed in claim 4, it is characterised in that first password by symmetric cryptographic algorithm,
At least one of open code algorithm, hash algorithm algorithm generates.
6. a kind of personal identification method, including:
The access request that mobile terminal is sent is obtained, the first password is carried in the access request, first password is once
Property information, for being verified to the identity of the mobile terminal;
First password is verified;
After being verified, access rights of the mobile terminal to the smart machine are assigned.
7. personal identification method as claimed in claim 6, it is characterised in that it is described first password is verified before,
Also include:Generate the second password;Second password is generated with first password by same algorithm;
It is described checking is carried out to the first password to include:Checking is compared with first password in second password, works as institute
When stating the second password and consistent the first password, it is verified.
8. personal identification method as claimed in claim 7, it is characterised in that the second password of the generation includes:Using agreement
Identical algorithm and operational factor, generate the second password;Or detection generates the algorithm of first password, is transported according to identical
The factor is calculated, generates the second password.
9. a kind of personal identification method, including:
The password of acquisition for mobile terminal first, first password is disposable information, for testing the identity of mobile terminal
Card;
The mobile terminal sends access request to gateway device, and first password is carried in the access request;
Gateway device obtains the access request, and first password is verified;
After being verified, the mobile terminal conducts interviews to the smart machine.
10. a kind of dynamic token, it is characterised in that including safety chip and communication unit, the safety chip generates first
Order, and first password is sent to by mobile terminal by communication unit;First password is disposable information, for pair
The identity of the mobile terminal is verified.
11. dynamic token as claimed in claim 10, it is characterised in that the dynamic token also includes power supply module, is used for
The dynamic token is powered, preserves the operational factor needed for generation first password in the safety chip.
12. dynamic token as claimed in claim 11, it is characterised in that the operational factor includes the UTC time factor and dynamic
The key message of token and the key message of gateway device, the algorithm include symmetric cryptographic algorithm, open code algorithm, miscellaneous
Gather at least one of algorithm algorithm.
A kind of 13. mobile terminal, it is characterised in that including:
Password acquisition module, for obtaining the first password of dynamic token generation, first password is disposable information, is used for
The identity of mobile terminal is verified;
Initiation module is accessed, for sending access request to gateway device, first password is carried in the access request;
Access modules, for after being verified, being conducted interviews to smart machine.
A kind of 14. gateway device, it is characterised in that including:
Acquisition module is accessed, for obtaining the access request of mobile terminal transmission, the first password, institute are carried in the access request
It is disposable information to state the first password, for being verified to the identity of the mobile terminal;
Authentication module, for being verified to first password;
Authority assigns module, for after being verified, assigning access rights of the mobile terminal to the smart machine.
15. gateway device as claimed in claim 14, it is characterised in that also include being used for the second password for generating the second password
Generation module;The authentication module is additionally operable to:Checking is compared with first password in second password;Second password
Generated with the first password by same algorithm.
16. gateway device as claimed in claim 15, it is characterised in that second command generation module is additionally operable to:Detection
The algorithm of first password is generated, and the second password is generated according to identical algorithms and operational factor;
Or, identical algorithm and operational factor according to agreement, generate the second password.
17. a kind of identification system, it is characterised in that including the dynamic token as described in claim any one of 10-12, such as
Mobile terminal described in claim 13, the gateway device as described in claim any one of 14-16, and set with the gateway
Standby connected smart machine.
18. identification system as claimed in claim 17, it is characterised in that the system also includes binding module, is used for
The dynamic token and the gateway device are bound.
19. identification system as claimed in claim 18, it is characterised in that the binding module is also used, makes described
Dynamic token and the gateway device exchange key message, the two is formed binding relationship;The dynamic token is according to the pass
Key information generates the first password;First password is disposable information, for being verified to the identity of the mobile terminal.
20. the identification system as described in claim any one of 17-19, it is characterised in that the dynamic token is arranged at
In at least one of terminal shell/set, key, ornament carry-on articles, or it is integrated in intelligent watch, Intelligent bracelet, intelligent jewellery
In at least one wearable device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610676231.3A CN107770126A (en) | 2016-08-16 | 2016-08-16 | Personal identification method, system and dynamic token, mobile terminal, gateway device |
PCT/CN2017/083732 WO2018032811A1 (en) | 2016-08-16 | 2017-05-10 | Identity identification method and system, dynamic token, mobile terminal, and gateway device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610676231.3A CN107770126A (en) | 2016-08-16 | 2016-08-16 | Personal identification method, system and dynamic token, mobile terminal, gateway device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107770126A true CN107770126A (en) | 2018-03-06 |
Family
ID=61196325
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610676231.3A Pending CN107770126A (en) | 2016-08-16 | 2016-08-16 | Personal identification method, system and dynamic token, mobile terminal, gateway device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107770126A (en) |
WO (1) | WO2018032811A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109617902A (en) * | 2018-12-29 | 2019-04-12 | 东莞见达信息技术有限公司 | Equipment authentication method establishes connection method and relevant device and system with gateway |
CN109743237A (en) * | 2018-12-12 | 2019-05-10 | 中国联合网络通信集团有限公司 | A kind of method for authenticating and gateway of APP |
CN110191112A (en) * | 2019-05-22 | 2019-08-30 | 北京百度网讯科技有限公司 | Auth method, device, mobile unit and server |
CN111127710A (en) * | 2019-12-19 | 2020-05-08 | 深圳市凯迪仕智能科技有限公司 | Intelligent lock safe off-line unlocking password generation method |
CN112929244A (en) * | 2021-01-21 | 2021-06-08 | 珠海格力电器股份有限公司 | Network distribution method, gateway device and network distribution system |
CN113141350A (en) * | 2021-03-23 | 2021-07-20 | 任杰 | Access authentication system suitable for intelligent home remote control |
CN113507368A (en) * | 2021-06-17 | 2021-10-15 | 北京惠而特科技有限公司 | Industrial control equipment identity authentication method and device based on dynamic password |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115134157A (en) * | 2022-06-29 | 2022-09-30 | 上海众人智能科技有限公司 | Dynamic right-confirming authentication method based on data security access |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103888470A (en) * | 2014-04-02 | 2014-06-25 | 飞天诚信科技股份有限公司 | Dynamic token synchronizing method and system |
US9038157B1 (en) * | 2014-02-09 | 2015-05-19 | Bank Of America Corporation | Method and apparatus for integrating a dynamic token generator into a mobile device |
CN104767623A (en) * | 2015-04-22 | 2015-07-08 | 苏州海博智能系统有限公司 | Dynamic password generating method and equipment |
CN105049209B (en) * | 2015-06-16 | 2018-10-23 | 中国银行股份有限公司 | Dynamic password formation method and device |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101500011A (en) * | 2009-03-13 | 2009-08-05 | 北京华大智宝电子系统有限公司 | Method and system for implementing dynamic password security protection |
CN103312509A (en) * | 2013-05-16 | 2013-09-18 | 彭汉儒 | Display method and display device of dynamic token and dynamic password |
CN104281791A (en) * | 2013-07-08 | 2015-01-14 | 北京旋极信息技术股份有限公司 | Dynamic token and dynamic password activating method |
-
2016
- 2016-08-16 CN CN201610676231.3A patent/CN107770126A/en active Pending
-
2017
- 2017-05-10 WO PCT/CN2017/083732 patent/WO2018032811A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9038157B1 (en) * | 2014-02-09 | 2015-05-19 | Bank Of America Corporation | Method and apparatus for integrating a dynamic token generator into a mobile device |
CN103888470A (en) * | 2014-04-02 | 2014-06-25 | 飞天诚信科技股份有限公司 | Dynamic token synchronizing method and system |
CN104767623A (en) * | 2015-04-22 | 2015-07-08 | 苏州海博智能系统有限公司 | Dynamic password generating method and equipment |
CN105049209B (en) * | 2015-06-16 | 2018-10-23 | 中国银行股份有限公司 | Dynamic password formation method and device |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109743237A (en) * | 2018-12-12 | 2019-05-10 | 中国联合网络通信集团有限公司 | A kind of method for authenticating and gateway of APP |
CN109743237B (en) * | 2018-12-12 | 2021-07-13 | 中国联合网络通信集团有限公司 | Authentication method of APP and gateway |
CN109617902A (en) * | 2018-12-29 | 2019-04-12 | 东莞见达信息技术有限公司 | Equipment authentication method establishes connection method and relevant device and system with gateway |
CN109617902B (en) * | 2018-12-29 | 2022-03-18 | 东莞见达信息技术有限公司 | Equipment authentication method, method for establishing connection with gateway, and related equipment and system |
CN110191112A (en) * | 2019-05-22 | 2019-08-30 | 北京百度网讯科技有限公司 | Auth method, device, mobile unit and server |
CN111127710A (en) * | 2019-12-19 | 2020-05-08 | 深圳市凯迪仕智能科技有限公司 | Intelligent lock safe off-line unlocking password generation method |
CN112929244A (en) * | 2021-01-21 | 2021-06-08 | 珠海格力电器股份有限公司 | Network distribution method, gateway device and network distribution system |
CN113141350A (en) * | 2021-03-23 | 2021-07-20 | 任杰 | Access authentication system suitable for intelligent home remote control |
CN113507368A (en) * | 2021-06-17 | 2021-10-15 | 北京惠而特科技有限公司 | Industrial control equipment identity authentication method and device based on dynamic password |
Also Published As
Publication number | Publication date |
---|---|
WO2018032811A1 (en) | 2018-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107770126A (en) | Personal identification method, system and dynamic token, mobile terminal, gateway device | |
CN107959686B (en) | A kind of Internet of Things security certification system and authentication method | |
CN105144670B (en) | Enable the person identifier system of Wireless Networking | |
CN105915502B (en) | The method and system being added conducive to network | |
CN101321165B (en) | Authentication for licensing in an embedded system | |
CN103502994B (en) | Method for handling privacy data | |
CN110291754A (en) | It is accessed using the system of mobile device | |
CN105684483B (en) | Register meter apparatus, agent equipment, application provider and corresponding method | |
CN102077545B (en) | Personal security manager for ubiquitous patient monitoring | |
CN107113553B (en) | Device, method and server for unified near-field communication architecture | |
CN103931220B (en) | For the cipher key derivation function of network communication | |
CN108292454A (en) | Access management | |
CN103905204B (en) | The transmission method and Transmission system of data | |
CN109075968A (en) | Method and apparatus for safety equipment certification | |
CN107507303A (en) | The method for unlocking of intelligent lock system and smart lock | |
CN109479049A (en) | System, apparatus and method for key supply commission | |
CN105069864A (en) | Door lock control secure communication scheme based on NFC (near field communication) function of smart phone | |
CN103391192B (en) | A kind of based on secret protection across security domain access control system and control method thereof | |
CN104715187A (en) | Method and apparatus used for authenticating nodes of electronic communication system | |
CN104010297B (en) | Wireless terminal configuration method and device and wireless terminal | |
CN106301793B (en) | A kind of method of PLC certifications and secure communication | |
CN104281272B (en) | Password Input processing method and processing device | |
CN109450648A (en) | Key generating device, data processing equipment and stream compression system | |
CN107886148A (en) | The management system and method for a kind of USB flash disk | |
CN108173648A (en) | Security processing method, equipment and storage medium based on private key escrow |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180306 |
|
RJ01 | Rejection of invention patent application after publication |