CN107770126A - Personal identification method, system and dynamic token, mobile terminal, gateway device - Google Patents

Personal identification method, system and dynamic token, mobile terminal, gateway device Download PDF

Info

Publication number
CN107770126A
CN107770126A CN201610676231.3A CN201610676231A CN107770126A CN 107770126 A CN107770126 A CN 107770126A CN 201610676231 A CN201610676231 A CN 201610676231A CN 107770126 A CN107770126 A CN 107770126A
Authority
CN
China
Prior art keywords
password
mobile terminal
gateway device
dynamic token
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610676231.3A
Other languages
Chinese (zh)
Inventor
陈荣
刘义
夏生凤
陈都习
卿荟知
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nationz Technologies Inc
Original Assignee
Nationz Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nationz Technologies Inc filed Critical Nationz Technologies Inc
Priority to CN201610676231.3A priority Critical patent/CN107770126A/en
Priority to PCT/CN2017/083732 priority patent/WO2018032811A1/en
Publication of CN107770126A publication Critical patent/CN107770126A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/283Processing of data at an internetworking point of a home automation network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a kind of personal identification method, system and dynamic token, mobile terminal, gateway device, the password of acquisition for mobile terminal first, first password is disposable information, for being verified to the identity of mobile terminal, mobile terminal sends access request to gateway device, and the first password is carried in access request, gateway device obtains access request, first password is verified, after being verified, mobile terminal conducts interviews to smart machine.By the implementation of the present invention, the authentication of mobile terminal accessing smart machine is realized, ensure that security, improves Consumer's Experience.

Description

Personal identification method, system and dynamic token, mobile terminal, gateway device
Technical field
It is whole more specifically to a kind of personal identification method, system and movement the present invention relates to smart home field End, gateway device.
Background technology
With the rise of Intelligent hardware, thousands of smart home product is applied in the daily life of the mankind.People Can pass through intelligent terminal APP and realize remote access and control to intelligent home device.Existing domestic intelligent gateway solution Certainly in scheme, the identity for accessing user is not identified for major part and certification, domestic intelligent equipment are present by unauthorized access Risk.For a user, how to ensure the implementation network ID authentication of access safety and can low cost, be to need what is solved to ask Topic.
The content of the invention
The technical problem to be solved in the present invention is how to realize the authentication for accessing user, for the technical problem, A kind of personal identification method, system and mobile terminal, gateway device are provided.
In order to solve the above technical problems, the present invention provides a kind of personal identification method, including a kind of password generated method, institute Stating password generated method includes:
Dynamic token and gateway device exchange key message;
Using the key message that the dynamic token and gateway device exchange as operational factor, according to the computing because Son the first password of generation;First password is disposable information, for being verified to the identity of mobile terminal.
Optionally, the password generated method also includes:User name is set together with the dynamic token with the gateway Standby binding.
Optionally, the dynamic token and gateway device exchange key message and included:By unique sequence of the dynamic token The random number that row number generates with the gateway device swaps.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The first password of dynamic token generation is obtained, first password is disposable information, for mobile terminal Identity is verified;
Access request is sent to gateway device, first password is carried in the access request;
After being verified, smart machine is conducted interviews.
Optionally, first password passes through at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm Algorithm generates.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The access request that mobile terminal is sent is obtained, carries the first password in the access request, first password is Disposable information, for being verified to the identity of the mobile terminal;
First password is verified;
After being verified, access rights of the mobile terminal to the smart machine are assigned.
Optionally, it is described first password is verified before, in addition to:Generate the second password;Second password Generated with first password by same algorithm;
It is described checking is carried out to the first password to include:Checking is compared with first password in second password, When second password and consistent the first password, it is verified.
Optionally, the second password of the generation includes:Using the identical algorithm and operational factor of agreement, second mouthful is generated Order;Or detection generates the algorithm of first password, according to identical operational factor, the second password is generated.
In order to solve the above technical problems, the present invention also provides a kind of personal identification method, including:
The password of acquisition for mobile terminal first, first password is disposable information, for entering to the identity of mobile terminal Row checking;
The mobile terminal sends access request to gateway device, and first password is carried in the access request;
Gateway device obtains the access request, and first password is verified;
After being verified, the mobile terminal conducts interviews to the smart machine.
In order to solve the above technical problems, the present invention also provides a kind of dynamic token, including safety chip and communication unit, institute State safety chip and generate the first password, and first password is sent to by mobile terminal by communication unit;The first Make as disposable information, for being verified to the identity of the mobile terminal.
Optionally, the dynamic token also includes power supply module, for being powered to the dynamic token, described in preservation The operational factor needed for generation first password in safety chip.
Optionally, the operational factor includes the key message and gateway device of the UTC time factor and dynamic token Key message, the algorithm include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm algorithm.
In order to solve the above technical problems, the present invention also provides a kind of mobile terminal, including:
Password acquisition module, for obtaining the first password of dynamic token generation, first password is disposable information, For being verified to the identity of mobile terminal;
Initiation module is accessed, for sending access request to gateway device, the first is carried in the access request Order;
Access modules, for after being verified, being conducted interviews to smart machine.
In order to solve the above technical problems, the present invention also provides a kind of gateway device, including:
Acquisition module is accessed, for obtaining the access request of mobile terminal transmission, first is carried in the access request Order, first password is disposable information, for being verified to the identity of the mobile terminal;
Authentication module, for being verified to first password;
Authority assigns module, for after being verified, assigning access right of the mobile terminal to the smart machine Limit.
Optionally, in addition to for generate the second password the second command generation module;The authentication module is additionally operable to:Will Checking is compared with first password in second password;Second password is generated with the first password by same algorithm.
Optionally, second command generation module is additionally operable to:Detection generates the algorithm of first password, and according to phase The second password is generated with algorithm and operational factor;
Or, identical algorithm and operational factor according to agreement, generate the second password.
In order to solve the above technical problems, the present invention also provides a kind of identification system, including dynamic token as the aforementioned, Mobile terminal, gateway device, and the smart machine being connected with the gateway device.
Optionally, the system also includes binding module, for the dynamic token and the gateway device to be tied up It is fixed.
Optionally, the binding module is also used, the dynamic token and the gateway device is exchanged key message, The two is set to form binding relationship;The dynamic token generates the first password according to the key message;First password is one Secondary property information, for being verified to the identity of the mobile terminal.
Optionally, the dynamic token is arranged at least one of terminal shell/set, key, ornament carry-on articles, or collection Into at least one of intelligent watch, Intelligent bracelet, intelligent jewellery wearable device.
Beneficial effect
It is mobile whole the invention provides a kind of personal identification method, system and dynamic token, mobile terminal, gateway device End obtains the first password, and the first password is disposable information, and for being verified to the identity of mobile terminal, mobile terminal is to net Close equipment and send access request, the first password is carried in access request, gateway device obtains access request, and the first password is carried out Checking, after being verified, mobile terminal conducts interviews to smart machine.By the implementation of the present invention, mobile terminal is realized The authentication of smart machine is accessed, security is ensure that, improves Consumer's Experience.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is a kind of personal identification method schematic flow sheet that first embodiment of the invention provides;
Fig. 2 is a kind of password generated method flow schematic diagram that first embodiment of the invention provides;
Fig. 3 is a kind of personal identification method schematic flow sheet that second embodiment of the invention provides;
Fig. 4 is the schematic flow sheet that the dynamic token that second embodiment of the invention provides exchanges information with gateway device;
Fig. 5 is a kind of personal identification method schematic flow sheet that third embodiment of the invention provides;
Fig. 6 is the first password and the second password computing schematic diagram that second embodiment of the invention provides;
Fig. 7 is a kind of composition schematic diagram for dynamic token that fourth embodiment of the invention provides;
Fig. 8 is a kind of mobile terminal composition schematic diagram that fifth embodiment of the invention provides;
Fig. 9 is a kind of composition schematic diagram for gateway device that sixth embodiment of the invention provides;
Figure 10 is a kind of composition schematic diagram for identification system that seventh embodiment of the invention provides.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The specific design of the present invention is that acquisition for mobile terminal is disposable, available for the identity for verifying mobile terminal First password, the connected gateway device of smart machine is conveyed by first password mobile terminal is verified, be verified Afterwards, mobile terminal can be made to conduct interviews smart machine, avoids the unprotected can of mobile terminal and arbitrarily visited Operation is asked, the security of system is ensure that, improves Consumer's Experience.
It is described in detail below by way of specific embodiment.
First embodiment
Reference picture 1, Fig. 1 are the personal identification method schematic flow sheet that first embodiment of the invention provides.
S101, the first password for obtaining dynamic token generation, the first password is disposable information, for mobile terminal Identity is verified;
S102, to gateway device access request is sent, carry the first password in access request;
S103, after being verified, smart machine is conducted interviews.
The mode of existing mobile terminal accessing smart machine, login interface is set usually at mobile terminal, with hard The mode of part or software, there are account and password or logged in without account and the form of password, then can passes through mobile whole End operates to smart machine.However, although this access mode might have the protection of account password, however, account is close The ease for use of code, which then result in, to be easy for revealing, and if once revealing, other users can is very easily to intelligence Equipment conducts interviews, so as to bring potential safety hazard.
The first password in the present embodiment is a disposable information, and it is generated based on unique operational factor, is had not Invertibity and non-repeatability, each first password and the first password afterwards are different, and avoiding problems by other users Stolen;First password can be used for being verified for the identity of mobile terminal, judge whether mobile terminal has permission to access intelligence Can equipment.When mobile terminal attempts to access that smart machine, first password is obtained, is then initiated by first password to intelligence The access request of energy equipment.
Interaction between smart machine and mobile terminal, it can not be directly, smart machine would generally be set by gateway It is standby to interact, including the access point apparatus of the Intranet of smart machine and outer net, sometimes the equipment can be router, sometimes It can be then the autonomous device that network connection be present with router to wait.It can be realized between smart machine by gateway device mutual Interaction, interacting between the other equipment of outer net can also be realized by gateway device.Mobile terminal can pass through internet Interact with gateway device, so as to realize the network connection between smart machine, smart machine is conducted interviews.
The generation of first password, generated by the dynamic token outside mobile terminal.Can be by wireless in mobile terminal Connected mode, such as Wifi (WIreless-Fidelity, Wireless Fidelity), Zigbee (ZigBee protocol), IrDA (Infrared Data Association, infrared connection technology), the radio connection such as Bluetooth (bluetooth), to obtain dynamic token life Into the first password, wherein Bluetooth radio connection is applied widely, and power consumption is relatively low, conduct in the present embodiment One preferably scheme can be carried out;The dynamic token can be by symmetric cryptographic algorithm, open code algorithm, hash algorithm At least one algorithm generate the first password.Wherein, symmetric cryptographic algorithm, such as DES/3DES, AES, SM4, hash algorithm, Such as SHA-1, SHA-256, SM3, it is however generally that, these algorithms take one in a dynamic token, different Its algorithm of dynamic token can also be different, and algorithm is different, and its first password generated also can be different.
Fig. 2 is refer to, the generation method of dynamic password is as follows:
S201, dynamic token and gateway device exchange key message;
S202, the key message for exchanging dynamic token and gateway device generate as operational factor according to operational factor First password, the first password is disposable information, for being verified to the identity of mobile terminal.
In addition, this method can also include:User name is bound together with dynamic token with gateway device.
Dynamic token, which exchanges key message with gateway device, can then include:By the unique sequence numbers and gateway of dynamic token The random number of equipment generation swaps.
Operational factor included by the generation of first password can include:UTC time (Universal Time Coordinated, Coordinated Universal Time(UTC)), the unique sequence numbers of dynamic token and dynamic token and gateway device be when binding, net Close equipment and be supplied to seed key of dynamic token etc..These operational factors are stored in dynamic token safety chip, raw Into the first password there is uniqueness.Below, by taking hash algorithm SM3 as an example, the generating process of the first password is as follows:
T=Tu/Tc
ID=T | Q }
S=F (K, ID)
OD=Truncate (S)
P1=OD% (10^N)
T is the time factor for participating in computing, and Tu is the UTC time write during production, and Tc is the password change with second unit In the cycle, its maximum length can be set as 60S, or other times.ID is hash algorithm input information, and Q is dynamic token Unique sequence numbers.K is the seed key that the dynamic token is supplied to by the gateway device, and F is the algorithmic function used, SM3 algorithms are corresponded in this example.Truncate is cut position function, and OD is its output result.N is the password digit ultimately generated, It is required that not less than 6.P1 is then the first password ultimately generated.According to this algorithmic procedure, it can be seen that UTC time, dynamic Unique sequence numbers, the gateway device of token are supplied to the seed key of dynamic token, and any at least one parameter among these has Institute is different, and the first final password is all different.
In the present embodiment, dynamic token can include safety chip, communication unit, physical button and power supply module, its In, safety chip can realize the generation of the first password by various algorithms;Communication unit can then allow dynamic token and movement Terminal, gateway device realize communication connection, provide the first password for mobile terminal, are bound with gateway device;Physical button Machine open/close etc. basic function can be then provided the user, or the Premium Features such as confirmation can also be provided;Power supply module is then Power, can be powered by dry cell, button cell etc. for dynamic token, typically dynamic token can be 3-5 is used under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token power supply.Dynamic token Physical form on can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories, can also be integrated in can In wearable device, such as intelligent watch, Intelligent bracelet.
Mobile terminal in the present embodiment, include but is not limited to:Smart mobile phone, tablet personal computer and other portable intelligents are worn Wear equipment, such as Intelligent bracelet, intelligent watch;By the mobile terminal of checking, the management list in mobile terminal can be passed through Member, such as application program, logging in gateway equipment, check, manage intelligent home device, encryption and decryption transmission data.Gateway device and intelligence It can be then connected between home equipment by way of a variety of wireless and/or wired connections, as the present embodiment is aforementioned The radio connections such as Wifi, Zigbee, IrDA, Bluetooth, or pass through the wired connection modes such as broadband connection.
A kind of personal identification method is present embodiments provided, obtains the first password, initiates to set intelligence by the first password Standby access request, after being verified, smart machine is conducted interviews;Pass through the implementation of the present embodiment, it is possible to achieve mobile whole End accesses the authentication of smart machine, ensure that interaction safety, improves Consumer's Experience.
Second embodiment
Reference picture 3, Fig. 3 are the personal identification method schematic flow sheet that second embodiment of the invention provides.
S301, the access request that mobile terminal is sent is obtained, the first password is carried in access request, the first password is once Property information, for being verified to the identity of mobile terminal;
S302, the first password is verified;
S303, after being verified, access rights of the giving mobile terminal to smart machine.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it His user is stolen;First password can be used for being verified for the identity of mobile terminal, and intelligence is attempted to access that in mobile terminal During equipment, first password is obtained, the access request to smart machine is then initiated by first password.
Smart machine is connected with gateway device, the access request to smart machine that mobile terminal is initiated by the first password It can then be handled by gateway device.First password is verified, checking be the first password legitimacy, that is, move Whether the first password that terminal provides has the authority for accessing smart machine.Specifically, in the present embodiment, enter to the first password Before row checking, it can also include:Generate the second password;Second password is generated with the first password by same algorithm, and the The generation time of one password and the second password matches;Carrying out checking to the first password can include:When the second password and first When password is consistent, it is verified.
Similar with the first password, the second password can be generated by way of hardware or software, and the generation of the second password Algorithm can include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm etc., wherein, symmetric cryptography Algorithm, such as DES/3DES, AES, SM4, such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, in gateway In equipment, these algorithms can exist simultaneously, and this is to adapt to the algorithms of different transmitted by each different mobile terminal The first password;With in the dynamic token of gateway device binding, each dynamic token can take different algorithms to generate the One password, accordingly, gateway device should then include the algorithm of the dynamic token of all bindings, and it is suitable thus to provide Second password and the first password carry out contrast verification.
The operation time of first password is write when dynamic token produces and processes by external equipment, the computing of the second password Time is then directly obtained by gateway device from Internet;Dynamic token and the equal built-in security chip of gateway device, not only possess RTC clocking capabilitys, and can be with securely held operational factor.In general, the time referred herein is all the standard time, i.e., UTC time, the time of the first password and the time of the second password should have consistent feelings in the time range of some permission Condition.For example, if the generation time interval of the first password and the second password is one minute, i.e., the first password in each minute is one Cause, such as in UTC time 2016.6.6 12:00:00 arrives 2016.6.6 12:01:In 00 this minute, the first password is D11, The time range of permission is ± 2 minutes/year, then it is meant that gateway device end the second password respectively in UTC time 2016.6.6 11:58:00 arrives 2016.1.1 12:03:00 in this five minutes, and one meets together and produces five the second passwords, is respectively D21, D22, D23, D24, D25, want D11 identical with any one in D21, D22, D23, D24, D25, then it is assumed that first Order and the second password match.Second password corresponding to being generated due to polyalgorithm can be included in gateway device, then, generation Second password can then include:The algorithm of detection the first password of generation, and search second password consistent with its algorithm.Namely Say, mobile terminal can also gather the generating algorithm of the first password, directly can be set with gateway in addition to gathering the first password Checking is compared with the second password of its time match in all in standby one by one, if any one second password and this first Password match, then be considered as fitting through.
The operational factor of second password generated, it is similar with the first password, can include UTC time, dynamic token it is unique The seed key that sequence number, gateway device provide.First password and the second password are generated by dynamic token and gateway device respectively, The two uses identical algorithms and operational factor, therefore has identical operation result.By taking the close hash algorithm SM3 of state as an example, the second password Generating process is as follows:
T=Ti/Tc
ID=T | Q }
S=F (K, ID)
OD=Truncate (S)
P2=OD% (10^N)
T is the time factor for participating in computing, and Ti is the current Internet time, and Tc is to change week with the password of second unit Phase, maximum length 60S.ID is hash algorithm input information, and Q is dynamic token unique sequence numbers.K is by the gateway device The seed key randomly generated, F are the algorithmic function used, correspond to SM3 algorithms in this example.Truncate is cut position letter Number, OD is its output result.N is the password digit ultimately generated, it is desirable to not less than 6.P2 is then second mouthful ultimately generated Order.According to this algorithmic procedure, it can be seen that UTC time, the unique sequence numbers of dynamic token, gateway device are supplied to dynamic The seed key of token, any at least one parameter among these is different, and the first final password is all different.As long as The operational factor of the participation computing of first password and the second password is identical, and algorithm is consistent, then the first password and the second password It just should be consistent, refer to Fig. 6, Fig. 6 shows the calculating process of the first password and the second password.
After being verified, access rights of the giving mobile terminal to smart machine.This can be referred to by assigning the authority accessed The authority of access, the authority of the access in certain time in other words, then need to re-start checking beyond this period.
In order to form consistent operational factor, in the access to smart machine that acquisition mobile terminal is initiated by the first password Before request, it can also include:Dynamic token and gateway device are bound, that is to say, that establish gateway device and dynamic Corresponding relation between token.Gateway device and dynamic token are bound, i.e., when user activates dynamic token, dynamic makes Board is exchanged with each other key message with gateway device, to reach the purpose of consistent operational factor.Key message includes but is not limited to:It is dynamic The unique sequence numbers of state token, seed key of gateway device generation etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation Bound with user name, finally activate gateway device, complete the exchange of key message.
In the present embodiment, gateway device is the access point apparatus of Intranet and outer net in intelligent domestic system, and sometimes this sets Standby is router, is then sometimes the autonomous device that network connection be present with router.System manager possesses in gateway device Portion's highest authority, it can increase or delete user and the dynamic token of binding.The composition of gateway device can include:Safe core Piece, communication unit and power supply module, safety chip can realize data encrypting and deciphering, generating random number, safe access control, Sram The functions such as the powered holding of data.As needed, the algorithm that safety chip can be supported includes but is not limited to:DES/3DES、AES、 The hash algorithms such as the symmetric cryptographic algorithms such as SM4, SHA-1, SHA-256, SM3, and open code algorithm.Power supply module then can be with System including being powered for gateway device, generally it is exactly civil power, can is all units power supply in gateway device, including it is foregoing Safety chip, communication unit etc.;Power supply module can also include standing alone as the only of the power supplies such as the safety chip in gateway device Vertical power supply, ensure the unique sequence numbers and seed key continuous and effective of dynamic token preserved in Sram.
In addition, for more preferable security performance, gateway device and the crucial letter after dynamic token binding, preserved in Sram Breath could be arranged to can be only used to read, and can not carry out write operation again.
A kind of personal identification method is present embodiments provided, mobile terminal is obtained and intelligence is set by what the first password was initiated Standby access request, the first password is verified, after being verified, access rights of the giving mobile terminal to smart machine. Pass through the implementation of the present embodiment, it is possible to achieve the authentication of mobile terminal accessing smart machine, ensure that interaction safety, lifting Consumer's Experience.
3rd embodiment
Reference picture 5, Fig. 5 are the personal identification method flow chart that third embodiment of the invention provides.
S501, the password of acquisition for mobile terminal first, the first password is disposable information, for entering to the identity of mobile terminal Row checking;
S502, mobile terminal send access request to gateway device, and the first password is carried in access request;
S503, gateway device obtain access request, and the first password are verified;
S504, after being verified, mobile terminal conducts interviews to smart machine.
First password is a disposable information, and it is generated based on unique operational factor.It can be used for for mobile terminal Identity verified, when mobile terminal attempts to access that smart machine, obtain first password, then pass through first password Initiate the access request to smart machine.First password is generated by dynamic token.The dynamic token can be calculated by symmetric cryptography At least one of method, open code algorithm, hash algorithm algorithm generates the first password.Wherein, symmetric cryptographic algorithm, such as DES/ 3DES, AES, SM4 etc., such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, these algorithms are in a dynamic One is taken in token, its algorithm of different dynamic tokens can also be different, and algorithm is different, its first password generated Can be different.
First password is verified, checking be the first password legitimacy, i.e., mobile terminal provide the first password Whether there is the authority for accessing smart machine.Specifically, in the present embodiment, the process verified to the first password can wrap Include:Checking is compared with the first password in second password;Second password is generated with the first password by same algorithm.
Similar with the first password, the second password can be generated by way of hardware or software, and the generation of the second password Algorithm can include at least one of symmetric cryptographic algorithm, open code algorithm, hash algorithm etc., wherein, symmetric cryptography Algorithm, such as DES/3DES, AES, SM4, such as hash algorithm, SHA-1, SHA-256, SM3, it is however generally that, in gateway In equipment, these algorithms can exist simultaneously, and this is to adapt to the algorithms of different transmitted by each different mobile terminal The first password;With in the dynamic token of gateway device binding, each dynamic token can take different algorithms to generate the One password, accordingly, gateway device should then include the algorithm of the dynamic token of all bindings, and it is suitable thus to provide Second password and the first password carry out contrast verification.
The operational factor of first password and the second password, it can include:UTC time, dynamic token unique sequence numbers, with And when dynamic token and gateway device binding, seed key that gateway device provides etc..
These operational factors can be very good to make a distinction the first password of different dynamic token generations, and gateway Corresponding the second different password in equipment can also be distinguished accordingly.
In order to form consistent operational factor, in the access to smart machine that acquisition mobile terminal is initiated by the first password Before request, it can also include:Dynamic token and gateway device are bound, that is to say, that establish gateway device and dynamic Corresponding relation between token.Gateway device and dynamic token are bound, i.e., when user activates dynamic token, dynamic makes Board is exchanged with each other key message with gateway device, to reach the purpose of consistent operational factor.Key message includes but is not limited to:It is dynamic The unique sequence numbers of state token, seed key of gateway device generation etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation Bound with user name, finally activate gateway device, complete the exchange of key message.
After being verified, gateway device giving mobile terminal is to the access rights of smart machine, mobile terminal can pair Smart machine conducts interviews.The authority of this visit can be referred to by assigning the authority accessed, the access in certain time in other words Authority, then need to re-start checking beyond this period.
A kind of personal identification method is present embodiments provided, the password of acquisition for mobile terminal first, is initiated by the first password To the access request of smart machine, gateway device obtains access request, and the first password is verified, after being verified, moves Dynamic terminal-pair smart machine conducts interviews.Pass through the implementation of the present embodiment, it is possible to achieve the body of mobile terminal accessing smart machine Part certification, interaction safety is ensure that, improves Consumer's Experience.
Fourth embodiment
With reference to figure 7, Fig. 7 is the composition schematic diagram for the dynamic token that fourth embodiment of the invention city provides.
Dynamic token in the present embodiment, including safety chip 1041 and communication unit 1042;Safety chip 1041 generates First password, and the first password is sent to by mobile terminal by communication unit 1042;First password is disposable information, is used for The identity of mobile terminal is verified.
In addition, dynamic token can also include power supply module 1043, for being powered to dynamic token, safe core is preserved The operational factor and algorithm needed for the password of generation first in piece 1041.Safety chip 1041 be for generate the first password, And in the generating process of the first password, operational factor and algorithm are two key elements;Wherein, when operational factor can include UTC Between the factor and dynamic token key message and gateway device key message, algorithm can include symmetric cryptographic algorithm, At least one of open code algorithm, hash algorithm algorithm.
Fig. 2 is refer to, the generation method of dynamic password is as follows:
S201, dynamic token and gateway device exchange key message;
S202, the key message for exchanging dynamic token and gateway device generate as operational factor according to operational factor First password.
Operational factor included by the generation of first password can include:UTC time, dynamic token unique sequence numbers, And when dynamic token and gateway device binding, gateway device is supplied to seed key of dynamic token etc..These computings because Son is stored in dynamic token safety chip, and the first password of generation has a uniqueness, different tokens generated first Password is different, and the first password that identical token generates in the different time is also different.
In the present embodiment, dynamic token 104 can include safety chip 1041, communication unit 1042, physical button 1044 And power supply module 1043, wherein, safety chip 1041 can realize the generation of the first password by various algorithms, and it is stored There are the various information needed for the first password of generation, such as algorithm, operational factor;Communication unit 1042 can then allow dynamic token and shifting Dynamic terminal, gateway device realize communication connection, provide the first password for mobile terminal, are bound with gateway device;Physics is pressed Key 1044 can then provide the user machine open/close etc. basic function, or can also provide the Premium Features such as confirmation;Power supply mould Block 1043 is powered for dynamic token, can be powered by dry cell, button cell etc., typically a dynamic Token can use 3-5 under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token confession Electricity.It can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories in the physical form of dynamic token, also may be used To be integrated in wearable device, such as intelligent watch, Intelligent bracelet.
5th embodiment
Reference picture 8, Fig. 8 are the composition schematic diagram for the mobile terminal that fifth embodiment of the invention provides.
Mobile terminal 10 in the present embodiment, including:
Password acquisition module 101, for obtaining the first password, the first password is disposable information, for mobile terminal 10 identity is verified;
Initiation module 102 is accessed, for sending access request to gateway device 21, described the is carried in the access request One password;
Access modules 103, for after being verified, being conducted interviews to smart machine.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it His user is stolen;First password can be used for being verified for the identity of mobile terminal 10, judge whether mobile terminal 10 has Authority accesses smart machine 22.
First password is generated by dynamic token 104;Dynamic token 104 passes through wireless and/or wired mode and movement Terminal 10 is connected, such as Wifi, Zigbee, IrDA, Bluetooth etc. mode, come obtain that other equipment is generated first The radio connection of password, wherein Bluetooth is applied widely, and power consumption is relatively low, more excellent as one in the present embodiment Scheme can be carried out;Specifically, dynamic token can be by symmetric cryptographic algorithm, open code algorithm, hash algorithm At least one algorithm generates the first password.Wherein, symmetric cryptographic algorithm, such as DES/3DES, AES, SM4, hash algorithm, such as SHA-1, SHA-256, SM3 etc., it is however generally that, these algorithms take one in a dynamic token, and different is dynamic Its algorithm of state token can also be different, and algorithm is different, and its first password generated also can be different.
Specifically, the operational factor included by the generation of the first password can include:UTC time, dynamic token it is unique When sequence number and dynamic token are bound with gateway device 21, gateway device 21 is supplied to seed key of dynamic token etc.. These operational factors are stored in dynamic token safety chip, and the first password of generation has uniqueness, different tokens institute First password of generation is different, and the first password that identical token generates in the different time is also different.
In the present embodiment, dynamic token can include safety chip, communication unit, physical button and power supply module, its In, safety chip can realize the generation of the first password by various algorithms;Communication unit can then allow dynamic token and movement Terminal 10, gateway device 21 realize communication connection, provide the first password for mobile terminal 10, are bound with gateway device 21; Physical button can then provide the user machine open/close etc. basic function, or can also provide the Premium Features such as confirmation;Power supply Module is powered for dynamic token, can be powered by dry cell, button cell etc., and typically a dynamic makes Board can use 3-5 under the supply of disposable power supply, or can also use and rechargeable battery as dynamic token power supply. Can be independent, portable carry-on articles, such as mobile phone shell/set, key, accessories in the physical form of dynamic token, can also It is integrated in wearable device, such as intelligent watch, Intelligent bracelet.
Mobile terminal 10 in the present embodiment, include but is not limited to:Smart mobile phone, tablet personal computer and other portable intelligents Wearable device, such as Intelligent bracelet, intelligent watch;Mobile terminal 10 by checking, can be by mobile terminal 10 Administrative unit, such as application program, logging in gateway equipment 21, check, manage intelligent home device, encryption and decryption transmission data.
Password acquisition module 101, access initiation module 102 in the present embodiment, access modules 103, can specifically pass through Processor combination communication unit in mobile terminal 10 is realized.
Sixth embodiment
Fig. 9 is refer to, Fig. 9 is the composition schematic diagram for the gateway device 21 that sixth embodiment of the invention provides.
Gateway device 21 in the present embodiment, including:
Acquisition module 211 is accessed, for obtaining the access request of the transmission of mobile terminal 10, first is carried in access request Order, the first password is disposable information, for being verified to the identity of mobile terminal 10;
Authentication module 212, for being verified to the first password;
Authority assigns module 213, for after being verified, access right of the giving mobile terminal 10 to smart machine 22 Limit.
The first password in the present embodiment is a disposable information, it based on unique operational factor generate, computing because Son is non-readable and has uniqueness, and the first password of generation equally has uniqueness and non-repeatability, and avoiding problems by it His user is stolen;First password can be used for being verified for the identity of mobile terminal 10, be attempted to access that in mobile terminal 10 During smart machine 22, first password is obtained, the access request to smart machine 22 is then initiated by first password.
Gateway device 21 is connected with smart machine 22, and the access acquisition module 211 in gateway device 21 obtains mobile terminal 10 access requests to smart machine 22 initiated.Authentication module 212 verifies that checking is the first password to the first password Legitimacy, i.e., mobile terminal 10 provide the first password whether have access smart machine 22 authority.Specifically, this implementation In example, in addition to for generating the second command generation module 214 of the second password;Authentication module 212 is tested the first password The process of card can include:Checking is compared with the first password in second password;Second password passes through same with the first password Kind algorithm generation.
Second password corresponding to being generated due to polyalgorithm can be included in gateway device 21, then, in the present embodiment The second command generation module 214 can be also used for:The algorithm of detection the first password of generation, and search consistent with its algorithm the Two passwords.That is, mobile terminal 10 in addition to gathering the first password, can also gather the generating algorithm of the first password, Checking directly can be compared one by one with the second password of all and its time match in gateway device 21, as long as any one Individual second password and first password match, then be considered as fitting through.
The operational factor of second password generated, it is similar with the first password, can include UTC time, dynamic token it is unique The seed key that sequence number, gateway device 21 provide.First password and the second password are respectively by dynamic token and gateway device 21 Generation, the two uses identical algorithms and operational factor, therefore has identical operation result.
After being verified, access rights of the giving mobile terminal 10 to smart machine 22.Assigning the authority accessed can refer to The authority of this visit, the authority of the access in certain time in other words, then need to re-start checking beyond this period.
In order to form consistent operational factor, obtain mobile terminal 10 by the first password initiate to smart machine 22 Before access request, it can also include:Dynamic token and gateway device 21 are bound, that is to say, that establish gateway device Corresponding relation between 21 and dynamic token.Gateway device 21 is bound with dynamic token, i.e., activating dynamic in user makes During board, dynamic token is exchanged with each other key message with gateway device 21, to reach the purpose of consistent operational factor.Key message bag Include but be not limited to:Seed key that unique sequence numbers, the gateway device 21 of dynamic token generate etc..
It refer to Fig. 4, the process for being exchanged with each other key message of dynamic token and gateway device is as follows:
S401, system manager's logging in gateway equipment, input the unique sequence numbers of dynamic token;
S402, gateway device randomly generate the true random number of self-defined digit, and user makees the Data Enter dynamic token For seed key, gateway device then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device, and gateway device is by the unique sequence numbers of the dynamic token of preservation Bound with user name, finally activate gateway device, complete the exchange of key message.
7th embodiment
Figure 10 is refer to, Figure 10 is a kind of composition schematic diagram for identification system that seventh embodiment of the invention provides.
Identification system in the present embodiment includes mobile terminal 10 and gateway device 21, and mobile terminal 10 and gateway are set Standby 21 is similar with previous embodiment, repeats no more here.
In addition, optional, binding module can also be included in identification system, for by the first command generation module 104 are bound with gateway device 21.
Dynamic token and gateway device 21 are bound, that is to say, that establish between gateway device 21 and dynamic token Corresponding relation.Gateway device 21 is bound with dynamic token, i.e., when user activates dynamic token, dynamic token and net Close equipment 21 and be exchanged with each other key message, to reach the purpose of consistent operational factor.Key message includes but is not limited to:Dynamic makes Seed key that unique sequence numbers, the gateway device 21 of board generate etc..
Fig. 4 is refer to, the process for being exchanged with each other key message of dynamic token and gateway device 21 is as follows:
S401, system manager's logging in gateway equipment 21, input the unique sequence numbers of dynamic token;
S402, gateway device 21 randomly generate the true random number of self-defined digit, and user is by the Data Enter dynamic token As seed key, gateway device 21 then preserves to the random number;
S403, user input personal identification code, activate dynamic token;
S404, user input user name in gateway device 21, and gateway device 21 is by unique sequence of the dynamic token of preservation Row number is bound with user name, is finally activated gateway device 21, is completed the exchange of key message.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (20)

1. a kind of personal identification method, including a kind of password generated method, the password generated method include:
Dynamic token and gateway device exchange key message;
Using the key message that the dynamic token and gateway device exchange as operational factor, given birth to according to the operational factor Into the first password;First password is disposable information, for being verified to the identity of mobile terminal.
2. personal identification method as claimed in claim 1, it is characterised in that the password generated method also includes:By user Name is bound together with the dynamic token with the gateway device.
3. personal identification method as claimed in claim 1 or 2, it is characterised in that the dynamic token and gateway device exchange Key message includes:The random number that the unique sequence numbers of the dynamic token generate with the gateway device is swapped.
4. a kind of personal identification method, including:
The first password of dynamic token generation is obtained, first password is disposable information, for the identity to mobile terminal Verified;
Access request is sent to gateway device, first password is carried in the access request;
After being verified, smart machine is conducted interviews.
5. personal identification method as claimed in claim 4, it is characterised in that first password by symmetric cryptographic algorithm, At least one of open code algorithm, hash algorithm algorithm generates.
6. a kind of personal identification method, including:
The access request that mobile terminal is sent is obtained, the first password is carried in the access request, first password is once Property information, for being verified to the identity of the mobile terminal;
First password is verified;
After being verified, access rights of the mobile terminal to the smart machine are assigned.
7. personal identification method as claimed in claim 6, it is characterised in that it is described first password is verified before, Also include:Generate the second password;Second password is generated with first password by same algorithm;
It is described checking is carried out to the first password to include:Checking is compared with first password in second password, works as institute When stating the second password and consistent the first password, it is verified.
8. personal identification method as claimed in claim 7, it is characterised in that the second password of the generation includes:Using agreement Identical algorithm and operational factor, generate the second password;Or detection generates the algorithm of first password, is transported according to identical The factor is calculated, generates the second password.
9. a kind of personal identification method, including:
The password of acquisition for mobile terminal first, first password is disposable information, for testing the identity of mobile terminal Card;
The mobile terminal sends access request to gateway device, and first password is carried in the access request;
Gateway device obtains the access request, and first password is verified;
After being verified, the mobile terminal conducts interviews to the smart machine.
10. a kind of dynamic token, it is characterised in that including safety chip and communication unit, the safety chip generates first Order, and first password is sent to by mobile terminal by communication unit;First password is disposable information, for pair The identity of the mobile terminal is verified.
11. dynamic token as claimed in claim 10, it is characterised in that the dynamic token also includes power supply module, is used for The dynamic token is powered, preserves the operational factor needed for generation first password in the safety chip.
12. dynamic token as claimed in claim 11, it is characterised in that the operational factor includes the UTC time factor and dynamic The key message of token and the key message of gateway device, the algorithm include symmetric cryptographic algorithm, open code algorithm, miscellaneous Gather at least one of algorithm algorithm.
A kind of 13. mobile terminal, it is characterised in that including:
Password acquisition module, for obtaining the first password of dynamic token generation, first password is disposable information, is used for The identity of mobile terminal is verified;
Initiation module is accessed, for sending access request to gateway device, first password is carried in the access request;
Access modules, for after being verified, being conducted interviews to smart machine.
A kind of 14. gateway device, it is characterised in that including:
Acquisition module is accessed, for obtaining the access request of mobile terminal transmission, the first password, institute are carried in the access request It is disposable information to state the first password, for being verified to the identity of the mobile terminal;
Authentication module, for being verified to first password;
Authority assigns module, for after being verified, assigning access rights of the mobile terminal to the smart machine.
15. gateway device as claimed in claim 14, it is characterised in that also include being used for the second password for generating the second password Generation module;The authentication module is additionally operable to:Checking is compared with first password in second password;Second password Generated with the first password by same algorithm.
16. gateway device as claimed in claim 15, it is characterised in that second command generation module is additionally operable to:Detection The algorithm of first password is generated, and the second password is generated according to identical algorithms and operational factor;
Or, identical algorithm and operational factor according to agreement, generate the second password.
17. a kind of identification system, it is characterised in that including the dynamic token as described in claim any one of 10-12, such as Mobile terminal described in claim 13, the gateway device as described in claim any one of 14-16, and set with the gateway Standby connected smart machine.
18. identification system as claimed in claim 17, it is characterised in that the system also includes binding module, is used for The dynamic token and the gateway device are bound.
19. identification system as claimed in claim 18, it is characterised in that the binding module is also used, makes described Dynamic token and the gateway device exchange key message, the two is formed binding relationship;The dynamic token is according to the pass Key information generates the first password;First password is disposable information, for being verified to the identity of the mobile terminal.
20. the identification system as described in claim any one of 17-19, it is characterised in that the dynamic token is arranged at In at least one of terminal shell/set, key, ornament carry-on articles, or it is integrated in intelligent watch, Intelligent bracelet, intelligent jewellery In at least one wearable device.
CN201610676231.3A 2016-08-16 2016-08-16 Personal identification method, system and dynamic token, mobile terminal, gateway device Pending CN107770126A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610676231.3A CN107770126A (en) 2016-08-16 2016-08-16 Personal identification method, system and dynamic token, mobile terminal, gateway device
PCT/CN2017/083732 WO2018032811A1 (en) 2016-08-16 2017-05-10 Identity identification method and system, dynamic token, mobile terminal, and gateway device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610676231.3A CN107770126A (en) 2016-08-16 2016-08-16 Personal identification method, system and dynamic token, mobile terminal, gateway device

Publications (1)

Publication Number Publication Date
CN107770126A true CN107770126A (en) 2018-03-06

Family

ID=61196325

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610676231.3A Pending CN107770126A (en) 2016-08-16 2016-08-16 Personal identification method, system and dynamic token, mobile terminal, gateway device

Country Status (2)

Country Link
CN (1) CN107770126A (en)
WO (1) WO2018032811A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617902A (en) * 2018-12-29 2019-04-12 东莞见达信息技术有限公司 Equipment authentication method establishes connection method and relevant device and system with gateway
CN109743237A (en) * 2018-12-12 2019-05-10 中国联合网络通信集团有限公司 A kind of method for authenticating and gateway of APP
CN110191112A (en) * 2019-05-22 2019-08-30 北京百度网讯科技有限公司 Auth method, device, mobile unit and server
CN111127710A (en) * 2019-12-19 2020-05-08 深圳市凯迪仕智能科技有限公司 Intelligent lock safe off-line unlocking password generation method
CN112929244A (en) * 2021-01-21 2021-06-08 珠海格力电器股份有限公司 Network distribution method, gateway device and network distribution system
CN113141350A (en) * 2021-03-23 2021-07-20 任杰 Access authentication system suitable for intelligent home remote control
CN113507368A (en) * 2021-06-17 2021-10-15 北京惠而特科技有限公司 Industrial control equipment identity authentication method and device based on dynamic password

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115134157A (en) * 2022-06-29 2022-09-30 上海众人智能科技有限公司 Dynamic right-confirming authentication method based on data security access

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103888470A (en) * 2014-04-02 2014-06-25 飞天诚信科技股份有限公司 Dynamic token synchronizing method and system
US9038157B1 (en) * 2014-02-09 2015-05-19 Bank Of America Corporation Method and apparatus for integrating a dynamic token generator into a mobile device
CN104767623A (en) * 2015-04-22 2015-07-08 苏州海博智能系统有限公司 Dynamic password generating method and equipment
CN105049209B (en) * 2015-06-16 2018-10-23 中国银行股份有限公司 Dynamic password formation method and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101500011A (en) * 2009-03-13 2009-08-05 北京华大智宝电子系统有限公司 Method and system for implementing dynamic password security protection
CN103312509A (en) * 2013-05-16 2013-09-18 彭汉儒 Display method and display device of dynamic token and dynamic password
CN104281791A (en) * 2013-07-08 2015-01-14 北京旋极信息技术股份有限公司 Dynamic token and dynamic password activating method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9038157B1 (en) * 2014-02-09 2015-05-19 Bank Of America Corporation Method and apparatus for integrating a dynamic token generator into a mobile device
CN103888470A (en) * 2014-04-02 2014-06-25 飞天诚信科技股份有限公司 Dynamic token synchronizing method and system
CN104767623A (en) * 2015-04-22 2015-07-08 苏州海博智能系统有限公司 Dynamic password generating method and equipment
CN105049209B (en) * 2015-06-16 2018-10-23 中国银行股份有限公司 Dynamic password formation method and device

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109743237A (en) * 2018-12-12 2019-05-10 中国联合网络通信集团有限公司 A kind of method for authenticating and gateway of APP
CN109743237B (en) * 2018-12-12 2021-07-13 中国联合网络通信集团有限公司 Authentication method of APP and gateway
CN109617902A (en) * 2018-12-29 2019-04-12 东莞见达信息技术有限公司 Equipment authentication method establishes connection method and relevant device and system with gateway
CN109617902B (en) * 2018-12-29 2022-03-18 东莞见达信息技术有限公司 Equipment authentication method, method for establishing connection with gateway, and related equipment and system
CN110191112A (en) * 2019-05-22 2019-08-30 北京百度网讯科技有限公司 Auth method, device, mobile unit and server
CN111127710A (en) * 2019-12-19 2020-05-08 深圳市凯迪仕智能科技有限公司 Intelligent lock safe off-line unlocking password generation method
CN112929244A (en) * 2021-01-21 2021-06-08 珠海格力电器股份有限公司 Network distribution method, gateway device and network distribution system
CN113141350A (en) * 2021-03-23 2021-07-20 任杰 Access authentication system suitable for intelligent home remote control
CN113507368A (en) * 2021-06-17 2021-10-15 北京惠而特科技有限公司 Industrial control equipment identity authentication method and device based on dynamic password

Also Published As

Publication number Publication date
WO2018032811A1 (en) 2018-02-22

Similar Documents

Publication Publication Date Title
CN107770126A (en) Personal identification method, system and dynamic token, mobile terminal, gateway device
CN107959686B (en) A kind of Internet of Things security certification system and authentication method
CN105144670B (en) Enable the person identifier system of Wireless Networking
CN105915502B (en) The method and system being added conducive to network
CN101321165B (en) Authentication for licensing in an embedded system
CN103502994B (en) Method for handling privacy data
CN110291754A (en) It is accessed using the system of mobile device
CN105684483B (en) Register meter apparatus, agent equipment, application provider and corresponding method
CN102077545B (en) Personal security manager for ubiquitous patient monitoring
CN107113553B (en) Device, method and server for unified near-field communication architecture
CN103931220B (en) For the cipher key derivation function of network communication
CN108292454A (en) Access management
CN103905204B (en) The transmission method and Transmission system of data
CN109075968A (en) Method and apparatus for safety equipment certification
CN107507303A (en) The method for unlocking of intelligent lock system and smart lock
CN109479049A (en) System, apparatus and method for key supply commission
CN105069864A (en) Door lock control secure communication scheme based on NFC (near field communication) function of smart phone
CN103391192B (en) A kind of based on secret protection across security domain access control system and control method thereof
CN104715187A (en) Method and apparatus used for authenticating nodes of electronic communication system
CN104010297B (en) Wireless terminal configuration method and device and wireless terminal
CN106301793B (en) A kind of method of PLC certifications and secure communication
CN104281272B (en) Password Input processing method and processing device
CN109450648A (en) Key generating device, data processing equipment and stream compression system
CN107886148A (en) The management system and method for a kind of USB flash disk
CN108173648A (en) Security processing method, equipment and storage medium based on private key escrow

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180306

RJ01 Rejection of invention patent application after publication