CN108055135A - A kind of method of intelligent terminal authentication management - Google Patents

A kind of method of intelligent terminal authentication management Download PDF

Info

Publication number
CN108055135A
CN108055135A CN201711331666.5A CN201711331666A CN108055135A CN 108055135 A CN108055135 A CN 108055135A CN 201711331666 A CN201711331666 A CN 201711331666A CN 108055135 A CN108055135 A CN 108055135A
Authority
CN
China
Prior art keywords
producer
intelligent terminal
certification
information
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711331666.5A
Other languages
Chinese (zh)
Other versions
CN108055135B (en
Inventor
裘炅
马哲雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Zhilian Technology Co ltd
Original Assignee
HANGZHOU TRACESOFT CO Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HANGZHOU TRACESOFT CO Ltd filed Critical HANGZHOU TRACESOFT CO Ltd
Priority to CN201711331666.5A priority Critical patent/CN108055135B/en
Publication of CN108055135A publication Critical patent/CN108055135A/en
Application granted granted Critical
Publication of CN108055135B publication Critical patent/CN108055135B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of methods of intelligent terminal authentication management, realize that intellectual product is anti-fake, products application process is anti-fake and product intelligent interface procedure is anti-fake, are realized using multi-signature mode and based on block chain mode:Equipment manufacturer's authentication information, equipment self authentication information, device procedures data, similar to the anti-fake certificate of the technical information project of deep learning mechanism etc., terms of trade etc. and execution certification and the record of correlated process.It is achieved thereby that intelligent terminal and other extraneous confidence levels of (including equipment, software, user etc.) and the reliability of automated transaction.

Description

A kind of method of intelligent terminal authentication management
Technical field
The present invention relates to product false proofs and products application process field of anti-counterfeit technology, and in particular to based on block chain technology Identification false-proof method.
Background technology
Device authentication mainly passes through at present:Label (electronic tags such as including RFID), on-line authentication, encrypting database are recognized Card etc..There are shortcomings for these modes:It is easy to by physical copy, can not realize accurate formula retrospect, can not realize that multidate information (can Effectively to prevent physical copy) authentication management.
In addition it is more and more general with smart machines such as recognition of face, Activity recognition, intelligent robot, automatic Pilots And all it is wisdom object to the producer of these equipment, the authentication management of embedded software and its authentication management of Intelligent treatment achievement Networking urgent problem.
If not be directed to equipment manufacturer certification, not effective certification to its embedded software, not to Intelligent treatment Effective certification of achievement, the problem of having several respects:
1. using lack of standardization:None- identified is counterfeit or fake products and different manufacturers or with producer's different model (including software Version) identification.
2. the certification of smart machine achievement can not automate:It once achievement is textual form, is easily tampered, also needs manually to consult Whole process data are confirmed, can not embody the advantage of intelligent achievement.
3. smart machine storage is limited:Such as video human face identification, storage basic at present is one month or so, passes through area Block chain technology can realize the storage of notarization grade, can cause to be difficult the problem of tracing evidence obtaining to avoid the storage period of one month.
4. different intelligent equipment achievement can not be used mutually:To put above as described above, structuring performance data can not obtain certification, Then the data between different intelligent equipment mutually can not be approved or integrate, and the application effect that can cause intelligent equipment is bad.
5. smart machine can be used for the identification learning of different characteristic, after deep learning training there are many purposes Learning effect is also required to certification, by the assessment of related IQ or learning ability, can be used for different scenes to confirm.
6. intelligent achievement can not realize the automated transaction between equipment, personnel, the ownership of such intelligent process uses Power is difficult to carry out mirror valency and transaction.
The content of the invention
The purpose of the present invention is being directed to the deficiency of prior art, a kind of method of intelligent terminal authentication management is provided.
The purpose of the present invention is what is be achieved through the following technical solutions:A kind of method of intelligent terminal authentication management, the party Method includes:
One device label is set to intelligent terminal, the content of the device label is as follows:Relevant authentication information is given birth to by producer It makes a summary into producer, producer's summary encrypts generation producer signature with producer key MKpri, while again by relevant authentication information+producer Summary+producer's signature generation device summary, then device Summary is encrypted into generation device subscription with device keys EKpri, correlation is recognized Demonstrate,prove information+producer's summary+producer's signature+device Summary+device subscription component devices label.Wherein, relevant authentication information is intelligence The flag information of energy terminal.
Authentication method is as follows:
It accesses intelligent terminal and obtains equipment public key, sign to obtain device Summary by decryption device, be set with existing plaintext Standby summary is compared, and unanimously then obtains factory public key from the remote interface of producer, signs to obtain producer by decrypting producer Summary carries out second comparison, is unanimously then verified certification.
Further, intelligent terminal makes a summary process data generating process, and process summary is encrypted with device keys EKpri gives birth to It signs into process, process data+process summary+process signature anabolic process label.
After twice certification, process data public key is obtained, is signed by decrypting process and obtains the process data of intelligent terminal.
Further, the device label is further included using update authentication information.
Further, the device label further includes the technical information project of intelligent terminal.
Further, the device label further includes the terms of trade of intelligent terminal, is obtaining the process of the intelligent terminal Before data or technical information project, first obtain terms of trade, agree to terms of trade could obtain intelligent terminal process data, Or technical information project etc..
Further, the certification is realized based on block chain, and plaintext device Summary and bright is preserved in the block chain Literary producer's summary, the node of the block chain first access intelligent terminal and obtain equipment public key, and obtaining original equipment by decryption makes a summary, It is verified with existing plaintext device Summary, it is errorless, then factory public key is obtained from the remote interface of producer, pass through decryption Genuine man summary is obtained, makes a summary and is verified with existing plaintext producer, be unanimously then verified certification.
Further, once certification is carried out to equipment, that is, generates an authentication information for including authenticated time, be stored in area In block chain.
Further, by rear, certification node obtains the process data of intelligent terminal or technical information project for certification, is packaged After be stored in block chain.
Further, the device label further includes the terms of trade of intelligent terminal, is obtaining the process of the intelligent terminal Before data or technical information project, first obtain terms of trade, agree to terms of trade could obtain intelligent terminal process data, Or technical information project etc..User generates Transaction Information, is stored in block chain when agreeing to or refusing terms of trade.
The beneficial effects of the present invention are:It is filled to the source of intelligent terminal, process, using result, model of mind etc. Divide certification or the certification using block chain type, it is achieved thereby that intelligent terminal and other external worlds are (including equipment, software, user Deng) confidence level, also enhance the reliability of automated transaction.
Description of the drawings
Fig. 1 is the schematic diagram that producer's summary is generated with 256 modes of SHA;
Fig. 2 is the schematic diagram that device Summary is generated with 256 modes of SHA.
Specific embodiment
Relevant authentication information of the present invention is the flag information of intelligent terminal, including product type, sequence number, certification The verification informations such as information, the date of production can also include photo of intelligent terminal etc..
Process data of the present invention is the data that generate in the intelligent terminal course of work, such as the data of acquisition (are taken the photograph As the image information that head gathers, the acoustic information of sound pick-up outfit acquisition), data processing knot process, handling result etc., comprising corresponding Temporal information, location information.
It is of the present invention to include embedded software edition upgrading, maintenance, maintenance, detection information using update authentication information Deng.
Technical information project of the present invention is the technical characteristic that intelligent terminal includes in itself.The depth of intelligent terminal Scheme information is practised, deep learning scheme information includes training scheme information and testing mechanism information etc., and training mechanism information includes Front and rear related data variation of training data, learning hierarchy, corresponding training parameter, characteristic value collection, result, study etc.;Test machine Information processed includes dependence test sample, result and exact value etc..For example, a camera with patented technology, this patent It is exactly a technical information project.
Terms of trade of the present invention can be a price.
With reference to specific embodiment, the invention will be further described.
Embodiment 1:Intelligent fire
Fire fighting device is mainly using antifalsification label or various certification certificates (CCCF certifications, the UL in the U.S. such as China at present Certification etc.).
Block chain interface module is installed to equipment additional, by interface module and the primary circuit system integration, for being adopted from original equipment Data (hydraulic pressure of such as fire fighting water system, water velocity data) needed for collection realize interface of internet of things.Generation one is non-simultaneously Symmetric key is to EK (EKpub, EKpri), and wherein key EKpri is only in local preservation, for the certification of system, public key EKpub Then can directly it be accessed.
1) certification:There are two types of modes, and one kind is producer's certification;Another kind is block chain certification.
I) producer's certification
It is this double signature scheme of producer's signature+device subscription to realize:The MK (MKpub, MKpri) of producer itself, will Relevant authentication information (including verification informations such as product type, sequence number, authentication information, the date of production, can also include photo Deng) with modes such as MD5 256 generating summary (producer's summary), producer's summary encrypts generation producer signature with producer key MKpri, Simultaneously again by relevant authentication information+producer's summary+producer's signature+use update authentication information (including embedded software edition upgrading, Maintenance, maintenance, detection information etc.) with 256 modes of SHA device Summary is generated, then device Summary is added with device keys EKpri Dense forming apparatus signature, then preserve in a device relevant authentication information+producer's summary+producer's signature+use update authentication information+ Device Summary+device subscription can be accessed directly.
Intelligent terminal can be accessed during certification and obtains equipment public key, obtaining original equipment by decryption makes a summary, and existing bright Literary device Summary is verified, errorless, then obtains factory public key from the remote interface of producer, equally after second is verified, It can approve relevant authentication information.
It is compared by relevant authentication information, using update authentication information and equipment.
Ii) block chain certification
It (can be independent that the handheld terminal of certification, which is registered together with equipment (block chain interface module) into certification block chain, Passage), inquiry current state obtains certification block, and the block of relevant authentication information will be preserved in conjunction with equipment, close by equipment Key decodes, and the dual signature information of previous step is sent on handheld terminal, you can obtains relevant authentication information.
The authentication mode and a upper authentication mode are the remote interfaces that need not access producer, but equipment networking is needed to grasp Make.
More than two authentication modes, when there is great update, safeguarded as embedded software edition upgrading, system are big, big maintenance, can To regenerate new relevant authentication information, can store respectively.
2) application process certification
When fire behavior alarm occurs in equipment (such as automatic fire alarm system), recordable time can also generate block, and Carry out relevant broadcast;When alarm is completed, the time can also be recorded, block can also be generated.Or whole process is being tied One block of unified generation, is broadcasted during beam.
Whole process is issued by block chain mode, can be recorded in liability management.Whole process record is effective.
Embodiment 2:Intelligent camera
Block chain interface module (can be software mode) is inserted in primary circuit, intelligent video camera head generation can be obtained Data (such as face recognition result, Activity recognition result data).Simultaneously generate a unsymmetrical key to EK (EKpub, EKpri), wherein key EKpri is only in local preservation, and for the certification of system, public key EKpub then can be directly accessed.
1) certification:There are two types of modes, and one kind is producer's certification;Another kind is block chain certification.
I) producer's certification
It is this double signature scheme of producer's signature+device subscription to realize:The MK (MKpub, MKpri) of producer itself, will Relevant authentication information (including verification informations such as product type, sequence number, authentication information, the date of production, can also include photo Deng) with modes such as MD5 256 generating summary (producer's summary), producer's summary encrypts generation producer signature with producer key MKpri, Simultaneously again by relevant authentication information+producer's summary+producer's signature+use update authentication information (including embedded software edition upgrading, Maintenance, maintenance, detection information etc.) with 256 modes of SHA device Summary is generated, then device Summary is added with device keys EKpri Dense forming apparatus signature, then preserve in a device relevant authentication information+producer's summary+producer's signature+use update authentication information+ Device Summary+device subscription can be accessed directly.
1 intelligent video camera head authentication data example of table
Intelligent terminal can be accessed during certification and obtains equipment public key, obtaining original equipment by decryption makes a summary, and existing bright Literary device Summary is verified, errorless, then obtains factory public key from the remote interface of producer, equally after second is verified, It can approve relevant authentication information.
It is compared by relevant authentication information, using update authentication information and equipment.
Ii) block chain certification
It (can be independent that the handheld terminal of certification, which is registered together with equipment (block chain interface module) into certification block chain, Passage), inquiry current state obtains certification block, and the block of relevant authentication information will be preserved in conjunction with equipment, close by equipment Key decodes, and the dual signature information of previous step is sent on handheld terminal, you can obtains relevant authentication information.
The authentication mode and a upper authentication mode are the remote interfaces that need not access producer, but equipment networking is needed to grasp Make.
More than two authentication modes, when there is great update, safeguarded as embedded software edition upgrading, system are big, big maintenance, can To regenerate new relevant authentication information, can store respectively.
2) application process certification
There are two types of mode, one kind is that device authentication sends or stores;Another kind is deposit block chain after certification.
I) device authentication
It is device subscription mode to realize:By relevant authentication information+producer's summary+producer's signature+intelligent recognition result (bag Include time, recognition result, identification process etc.) device Summary is generated with 256 modes of SHA, then by device Summary with device keys EKpri encryption generation device subscriptions, then relevant authentication information+producer's summary+producer's signature+intelligent recognition knot is preserved in a device Fruit+device Summary+device subscription directly can access or be sent in related system (for integrating or exchanging).
Intelligent terminal can be accessed during certification and obtains equipment public key, obtaining original equipment by decryption makes a summary, and existing bright Literary device Summary is verified, errorless, can approve intelligent recognition result.It, can be from if needing further exist for producer's certification Factory public key is obtained in the remote interface of producer, equally after second is verified, you can accreditation relevant authentication information.
2 intelligent video camera head recognition result data instance of table
Ii block chain) is inserted after certification
When equipment has intelligent recognition result, block chain, could be by intelligent recognition knot by the certification to equipment and producer Fruit, time and authentication content generation block, and broadcasted.The video of intelligent recognition can not preserve.Or after certification, access Head memory is imaged, and the memory (image of acquisition, video information) of camera is preserved or shared in block chain.
The authentication mode and a upper authentication mode are the remote interfaces that need not access producer, but equipment networking is needed to grasp Make.
3) certification of study mechanism
Since study mechanism is different, recognition effect can also have any different, and can carry out block chain registration, face to study mechanism Identification intelligent video camera, by various training datas, by the statistical analysis of multilayered invisible feature, it can be deduced that know others Face characteristic value, and pass through the result exact value test of test sample, you can approve the normal use of intelligent camera.
3 intelligent video camera head learning process of table and training data example
For this study mechanism of certification, and be attached in the application result of intelligent camera, using following two modes come It carries out:
There are two types of mode, one kind is that device authentication sends or stores;Another kind is deposit block chain after certification.
I) device authentication
It is device subscription mode to realize:By relevant authentication information+producer's summary+producer's signature+deep learning mechanism letter (including training scheme information and testing mechanism information etc., training mechanism information includes training data, learning hierarchy, corresponding instruction to breath Front and rear related data variation of white silk parameter, characteristic value collection, result, study etc.;Testing mechanism information includes dependence test sample, knot Fruit and exact value etc.) with 256 modes of SHA generate device Summary, then device Summary is set with device keys EKpri encryption generations Standby signature, then relevant authentication information+producer's summary+producer's signature+deep learning scheme information+device Summary is preserved in a device + device subscription directly can be accessed or be sent in related system (assessment and certification that are used for learning ability).
Intelligent terminal can be accessed during certification and obtains equipment public key, obtaining original equipment by decryption makes a summary, and existing bright Literary device Summary is verified, errorless, can approve study mechanism information.It, can be from if needing further exist for producer's certification Factory public key is obtained in the remote interface of producer, equally after second is verified, you can accreditation relevant authentication information.
Ii block chain) is inserted after certification
When new study mechanism is dispatched from the factory, updates or realized to equipment, block chain passes through the certification to equipment and producer, ability Deep learning scheme information, time and authentication content are generated into block, and broadcasted.For study mechanism assessment and recognize Card.
The authentication mode and a upper authentication mode are the remote interfaces that need not access producer, but equipment networking is needed to grasp Make.
Additionally, due to intelligent camera can there are many study mechanism, such as recognition of face, handwritten word identification, other Particular image feature recognition, it is possible to which there are many storage, understanding of deep learning scheme information etc..
4) data trade
By the commercialization that ownership and the right to use are realized to application verification process and study mechanism certification, it can be estimated that or Appraisal substantially is provided, realizes the commercial transaction processes of equipment room, software and equipment room.
The content of transaction can include the technical information of the data (process data) and camera of camera acquisition in itself Project (Image Compression, Techniques of Automatic Focusing, light intensity self-adaptive technology etc.), after the completion of certification, that is, obtains terms of trade, Such as price;Agree to that terms of trade could obtain process data or technical information project of intelligent terminal etc..
And there are two types of modes
I) device authentication of process of exchange
It is device subscription mode to realize:By relevant authentication information+producer's summary+producer's signature+pricing information (including intelligence Can recognition result price, the price and test value of deep learning model) with 256 modes of SHA generate device Summary, then will Device Summary encrypts generation device subscription with device keys EKpri, then preserve in a device relevant authentication information+producer summary+ Producer's signature+pricing information+device Summary+device subscription can be accessed directly or is sent in related system (for intelligent achievement Transaction).
Intelligent terminal can be accessed during certification and obtains equipment public key, obtaining original equipment by decryption makes a summary, and existing bright Literary device Summary verified, it is errorless then can be with subscription price information.It, can be from producer if needing further exist for producer's certification Remote interface in obtain factory public key, equally after second is verified, you can accreditation relevant authentication information and obtains transaction item Part if agreeing to transaction, can obtain relationship trading project, such as process data, technical information project etc. after payment.
During networking purchase, single or multiple purchases of the equipment information above can be selected, then realize e-payment.So Complete the transaction of the various data such as intelligent recognition process, deep learning model and test process data.
In addition the equipment is by the comparison of test data, it can be found that preferably deep learning model, can also select it The higher deep learning model of his degree of intelligence or test process data, and carry out electronic transaction.
Ii) the block chain of process of exchange
User generates Transaction Information, comprising in pricing information, time and certification when agreeing to or refusing terms of trade Hold, form contract, and generate block, broadcast.
During networking purchase, single or multiple purchases of the equipment information above can be selected, then realize the electricity of block chain type Son transaction.The various numbers such as intelligent recognition process, deep learning model and test process data are so completed by block chain currency According to transaction.
In addition the equipment is by the comparison of test data, it can be found that preferably deep learning model, which can also The higher deep learning model of other degree of intelligence or test process data are selected, and carry out the electronic transaction of block chain type.
The authentication mode and a upper authentication mode are the remote interfaces that need not access producer, but equipment networking is needed to grasp Make.

Claims (9)

  1. A kind of 1. method of intelligent terminal authentication management, which is characterized in that this method includes:
    One device label is set to intelligent terminal, the content of the device label is as follows:Relevant authentication information is generated factory by producer Family's summary, producer's summary encrypt generation producer signature with producer key MKpri, at the same again by relevant authentication information+producer summary+ Producer's signature generation device summary, then device Summary is encrypted into generation device subscription, relevant authentication information with device keys EKpri + producer summary+producer's signature+device Summary+device subscription component devices label.Wherein, relevant authentication information is intelligent terminal Flag information.
    Authentication method is as follows:
    It accesses intelligent terminal and obtains equipment public key, sign to obtain device Summary by decryption device, be plucked with existing plaintext equipment It is compared, unanimously then obtains factory public key from the remote interface of producer, sign to obtain producer's summary by decrypting producer, Second comparison is carried out, is unanimously then verified certification.
  2. 2. according to the method described in claim 1, it is characterized in that, intelligent terminal makes a summary process data generating process, process Summary is with device keys EKpri encryption generating process signatures, process data+process summary+process signature anabolic process label.
    After twice certification described in claim 1, process data public key is obtained, is signed by decrypting process and obtains intelligent terminal Process data.
  3. 3. according to the method described in claim 1, it is characterized in that, the device label is further included using update authentication information.
  4. 4. according to the method described in claim 1, it is characterized in that, the device label further includes the technical information of intelligent terminal Project.
  5. 5. the method stated according to claim 1, which is characterized in that the device label further includes the terms of trade of intelligent terminal, Before the process data of the intelligent terminal or technical information project is obtained, terms of trade are first obtained, agree to that terms of trade can just obtain Obtain process data or technical information project of intelligent terminal etc..
  6. 6. according to claim 1-5 any one of them methods, which is characterized in that the certification is realized based on block chain, institute It states and plaintext device Summary and plaintext producer summary is preserved in block chain, the node of the block chain first accesses intelligent terminal acquisition Equipment public key obtains original equipment by decryption and makes a summary, verified with existing plaintext device Summary, errorless then again from producer Factory public key is obtained in remote interface, obtaining genuine man by decryption makes a summary, and makes a summary and is verified with existing plaintext producer, and one Cause is then verified certification.
  7. 7. according to the method described in claim 6, it is characterized in that, carrying out once certification to equipment, i.e., generation one, which includes, recognizes The authentication information of time is demonstrate,proved, is stored in block chain.
  8. 8. according to the method described in claim 6, it is characterized in that, certification by rear, certification node obtain intelligent terminal mistake Number of passes evidence or technical information project, are stored in after packing in block chain.
  9. 9. according to the method described in claim 8, it is characterized in that, the device label further includes the transaction item of intelligent terminal Part before the process data of the intelligent terminal or technical information project is obtained, first obtains terms of trade, agrees to terms of trade Process data or technical information project of intelligent terminal etc. can be obtained.User when agreeing to or refusing terms of trade, i.e. hand over by generation Easy information is stored in block chain.
CN201711331666.5A 2017-12-13 2017-12-13 Intelligent terminal authentication management method Active CN108055135B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711331666.5A CN108055135B (en) 2017-12-13 2017-12-13 Intelligent terminal authentication management method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711331666.5A CN108055135B (en) 2017-12-13 2017-12-13 Intelligent terminal authentication management method

Publications (2)

Publication Number Publication Date
CN108055135A true CN108055135A (en) 2018-05-18
CN108055135B CN108055135B (en) 2021-03-23

Family

ID=62132568

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711331666.5A Active CN108055135B (en) 2017-12-13 2017-12-13 Intelligent terminal authentication management method

Country Status (1)

Country Link
CN (1) CN108055135B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711011A (en) * 2018-05-22 2018-10-26 杭州全视软件有限公司 Pass through Internet of Things generation, distribution task and the method for obtaining task completion assessment
CN109104311A (en) * 2018-08-06 2018-12-28 腾讯科技(深圳)有限公司 Device management method, device, medium and electronic equipment based on block chain
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
WO2019113838A1 (en) * 2017-12-13 2019-06-20 杭州全视软件有限公司 Method for managing smart terminal authentication
CN112069481A (en) * 2020-08-06 2020-12-11 广东工业大学 Transaction management method and system for industrial equipment products
CN112689833A (en) * 2018-10-01 2021-04-20 二村宪人 Information communication device, authentication program for information communication device, and authentication method
CN112787972A (en) * 2019-11-04 2021-05-11 成都鼎桥通信技术有限公司 System, method and device for near-end maintenance authentication in Internet of things
CN112905477A (en) * 2021-03-15 2021-06-04 苏州智行众维智能科技有限公司 Automatic driving simulation test data release system, method, device and equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1337645A (en) * 2000-08-04 2002-02-27 上海普德科技发展有限公司 Commodity network scanning anti-fake system and its electronic identification label
EP2565832A2 (en) * 2011-08-31 2013-03-06 Q-Tag AG Methods and devices for monitoring the integrity of an article during transporting said article
CN105469132A (en) * 2016-01-13 2016-04-06 上海众烁信息科技有限公司 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1337645A (en) * 2000-08-04 2002-02-27 上海普德科技发展有限公司 Commodity network scanning anti-fake system and its electronic identification label
EP2565832A2 (en) * 2011-08-31 2013-03-06 Q-Tag AG Methods and devices for monitoring the integrity of an article during transporting said article
CN105469132A (en) * 2016-01-13 2016-04-06 上海众烁信息科技有限公司 Duplicate coding internet of things traceability security label and 2-dimensional bar code security traceability method
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019113838A1 (en) * 2017-12-13 2019-06-20 杭州全视软件有限公司 Method for managing smart terminal authentication
CN108711011A (en) * 2018-05-22 2018-10-26 杭州全视软件有限公司 Pass through Internet of Things generation, distribution task and the method for obtaining task completion assessment
CN109104311B (en) * 2018-08-06 2021-08-31 腾讯科技(深圳)有限公司 Block chain-based device management method, apparatus, medium, and electronic device
CN109104311A (en) * 2018-08-06 2018-12-28 腾讯科技(深圳)有限公司 Device management method, device, medium and electronic equipment based on block chain
CN112689833B (en) * 2018-10-01 2022-06-07 二村宪人 Information communication device, authentication program for information communication device, and authentication method
CN112689833A (en) * 2018-10-01 2021-04-20 二村宪人 Information communication device, authentication program for information communication device, and authentication method
CN109327457A (en) * 2018-11-09 2019-02-12 广州大学 A kind of internet of things equipment identity identifying method and system based on block chain
CN109544182A (en) * 2018-11-20 2019-03-29 孟凡富 Product false proof verification method and system
CN109544182B (en) * 2018-11-20 2021-05-14 孟凡富 Product anti-counterfeiting verification method and system
CN112787972A (en) * 2019-11-04 2021-05-11 成都鼎桥通信技术有限公司 System, method and device for near-end maintenance authentication in Internet of things
CN112069481A (en) * 2020-08-06 2020-12-11 广东工业大学 Transaction management method and system for industrial equipment products
CN112905477A (en) * 2021-03-15 2021-06-04 苏州智行众维智能科技有限公司 Automatic driving simulation test data release system, method, device and equipment
CN112905477B (en) * 2021-03-15 2022-12-13 苏州智行众维智能科技有限公司 Automatic driving simulation test data release system, method, device and equipment

Also Published As

Publication number Publication date
CN108055135B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN108055135A (en) A kind of method of intelligent terminal authentication management
US10320807B2 (en) Systems and methods relating to the authenticity and verification of photographic identity documents
CN107871063A (en) Anti-tamper video and audio recording digital signature method, device and storage medium
CN107292629A (en) Anti-counterfeit tracking verification method based on block chain and the device using this method
CN109034843A (en) A kind of generation method, verification method and the system of article anti-counterfeit information
CN110351239A (en) It is a kind of based on the electronic contract storage method and device of block chain, electronic equipment
CN107633413A (en) A kind of anti-fake traceability system and method
CN106327206A (en) Genuine product certification means and system
CN108959884B (en) Human authentication verification device and method
CN111695648A (en) Block chain electronic tag device and product traceability authentication system
CN106603532B (en) Method and system for authenticating education and finance composite card
US11687910B2 (en) Relay attack prevention for electronic QR codes
CN109815289A (en) Block generation method, calculating equipment, storage medium for block chain network
CN106710032A (en) Entrance guard opening method and device
CN111737346A (en) Unmanned hotel management method, equipment and medium based on block chain
JP2023539712A (en) Generation of obfuscated identification templates for transaction validation
CN106709534A (en) Anti-counterfeit verification system of electronic certificate
TW200805204A (en) Method and apparatus for safely processing sensitive information
KR100524176B1 (en) Mobile phone capable of reading genuine article verifying information stored in a RF-tag and method for administrating service management executable in a computer communicating with the same phone
EA035937B1 (en) Secure item identification based on physical label properties
CN108921080A (en) Image-recognizing method, device and electronic equipment
WO2015028339A1 (en) Mobile transaction data verification device and method of data verification
CN110070365B (en) Commodity evidence storing method and device based on block chain and electronic equipment
Jiwtode et al. Deepfake video detection using neural networks
CN115203647A (en) Stereoscopic model right protection and tracing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221230

Address after: 310000 Room 407, 4th Floor, Building 10, No. 972, Moganshan Road, Gongshu District, Hangzhou, Zhejiang

Patentee after: Zhejiang Zhilian Technology Co.,Ltd.

Address before: 2 / F, building 5, No.5 Xianghong Road, Gongshu District, Hangzhou, Zhejiang 310000

Patentee before: HANGZHOU TRACESOFT Co.,Ltd.

TR01 Transfer of patent right