CN108667610A - A kind of equipment authentication method - Google Patents

A kind of equipment authentication method Download PDF

Info

Publication number
CN108667610A
CN108667610A CN201710215070.2A CN201710215070A CN108667610A CN 108667610 A CN108667610 A CN 108667610A CN 201710215070 A CN201710215070 A CN 201710215070A CN 108667610 A CN108667610 A CN 108667610A
Authority
CN
China
Prior art keywords
digital signature
equipment
position encoded
inquiry server
encoded data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710215070.2A
Other languages
Chinese (zh)
Other versions
CN108667610B (en
Inventor
田雪松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qilu Management Consulting Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201710215070.2A priority Critical patent/CN108667610B/en
Publication of CN108667610A publication Critical patent/CN108667610A/en
Application granted granted Critical
Publication of CN108667610B publication Critical patent/CN108667610B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/033Pointing devices displaced or positioned by the user, e.g. mice, trackballs, pens or joysticks; Accessories therefor
    • G06F3/038Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry
    • G06F3/0386Control and interface arrangements therefor, e.g. drivers or device-embedded control circuitry for light pen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The present embodiments relate to a kind of equipment authentication methods, including:Digital pen equipment obtains the position encoded image of substrate, generates the position encoded data for the first digital signature for including digital pen equipment;Digital pen equipment obtains the device identifier of digital pen equipment, and position coded data is encrypted, and encrypted position encoded data and device identifier are sent to inquiry server by network interface device;Inquiry server parses encrypted position encoded data, when inquiry has the first digital signature in the digital signature library for inquiring server, generates Authentication receipt and the second digital signature, and determine the information of corresponding first Service Processing Unit;The information of first Service Processing Unit is sent to digital pen equipment by inquiry server by network interface device, and the second digital signature is sent to the first Service Processing Unit, the first digital signature in the coded data of position is verified according to the second digital signature to the first Service Processing Unit.

Description

A kind of equipment authentication method
Technical field
The present invention relates to field of communication technology more particularly to a kind of equipment authentication methods.
Background technology
Digital scanning pen is a kind of novel input equipment, can be printed on position encoded image fully according to natural custom It is write on paper, when writing can leave written handwriting on paper, can also use anhydrous plastics pen core.Pass through digital scanning The acquisition of the optical system and the position encoded image of data processing modules implement of pen carries out position by uploading to application server The processing of coded image data.
In practical applications, different digital scanning pens may have different scanning permissions, thus how be swept to number Pen is authenticated management, to ensure that it can have corresponding permission in use, guarantees data security and validity Basis.
Invention content
The object of the present invention is to provide a kind of equipment authentication method, the straight of digital pen equipment and service processing equipment has been decoupled Binding is connect, safety, convenience that digital pen equipment carries out data interaction with service processing equipment can be improved, simplification operated Journey improves compatibility and data-handling efficiency, and promotes user experience.
To achieve the above object, an embodiment of the present invention provides a kind of equipment authentication method, the method includes:
Digital pen equipment obtains the position encoded image of substrate, generates position encoded data;In the position encoded data Include the first digital signature of the digital pen equipment;
The digital pen equipment obtains the device identifier of the digital pen equipment, and is carried out to the position encoded data Encrypted position encoded data and device identifier are sent to network interface device by encryption;
The encrypted position encoded data and device identifier are sent to inquiry server by the network interface device;
The inquiry server parses the encrypted position encoded data, obtains first digital signature, And inquire whether there is first digital signature in the digital signature library of the inquiry server according to the digital signature;
When with when, the inquiry server generates Authentication receipt and the second digital signature, when the Authentication receipt has Between stab;
The inquiry server determines corresponding first Service Processing Unit according to the position encoded data that parsing obtains Information;
The information of first Service Processing Unit is sent to by the inquiry server by the network interface device The digital pen equipment, to the digital pen equipment according to the information of first Service Processing Unit by the encrypted position It sets coded data and is sent to first Service Processing Unit;And
Second digital signature is sent to first Service Processing Unit by the inquiry server so that described One Service Processing Unit stores second digital signature, to first Service Processing Unit according to described second Digital signature verifies the first digital signature in the position encoded data.
Preferably, the method further includes:
When not having first digital signature in the digital signature library of the inquiry server, serviced in the inquiry First digital signature is added in the digital signature library of device.
Preferably, before the encryption, the method further includes:
The digital pen equipment generates symmetric key;
Establish and record the related information of the symmetric key and the device identifier;
The symmetric key and the device identifier are sent to the inquiry by the network interface device to service Device;
The inquiry server is to the symmetric key received and the symmetric key and the device identifier Incidence relation recorded and stored.
It is further preferred that described be encrypted specially the position encoded data:
The position encoded data are encrypted according to the symmetric key.
It is further preferred that the inquiry server parses specially the encrypted position encoded data:
The encrypted position encoded data are decrypted according to the symmetric key in the inquiry server;
Data parsing is carried out to the position encoded data after decryption processing.
Preferably, it is determined at corresponding first business according to the position encoded data that parsing obtains in the inquiry server After the information for managing unit, the method further includes:
The inquiry server generates third digital signature according to the information of first Service Processing Unit;
The third digital signature is sent to the digital pen equipment by the inquiry server, is set to the digital pen It is standby that first Service Processing Unit is verified according to the third digital signature.
Preferably, the method further includes:Life cycle is added to the timestamp.
Equipment authentication method provided in an embodiment of the present invention, has decoupled digital pen equipment and the direct of service processing equipment is tied up It is fixed, safety, convenience that digital pen equipment carries out data interaction with service processing equipment can be improved, operating process is simplified, Compatibility and data-handling efficiency are improved, and promotes user experience.
Description of the drawings
Fig. 1 is the schematic diagram of device authentication system provided in an embodiment of the present invention;
Fig. 2 is the method flow diagram of equipment authentication method provided in an embodiment of the present invention.
Specific implementation mode
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
The equipment authentication method that embodiment proposes in order to better understand the present invention, the first system tray to running this method Structure illustrates.
As shown in Figure 1, the system includes:Substrate 1, digital pen equipment 2, network interface device 3, inquiry server 4 and more A Service Processing Unit 5 (specifically includes Service Processing Unit 51, Service Processing Unit 52, Service Processing Unit 53).
The surface of substrate 1 has coded image, and substrate 1 is specifically as follows coding sheet, can also be electronic display unit etc. Device.Coding pattern at least occupies the part on 1 surface of substrate, passes through 2 optical readable of digital pen equipment.
Network interface device 3 is the port device that digital pen equipment 2 accesses network, for example can be router.
It inquires matching rule of the server 4 between digital pen equipment 2 and Service Processing Unit 5 to record, and follows Matching rule is that digital pen equipment 2 distributes corresponding Service Processing Unit 5, by Service Processing Unit 5 to received position Coded data is set to be handled.
In systems, Service Processing Unit can be application server, and Service Processing Unit 5 is multiple, is shown in figure It it is 3, different Service Processing Units can be different in performed processing function or flow, for example can be corresponding The either digital pen equipment 2 of different software versions or can also be that correspond to setting different of different types of digital pen equipment 2 Digital pen equipment 2 of user type etc..
The system architecture using present device authentication method has briefly been described above, with reference to Fig. 2 to this hair The equipment authentication method of bright offer illustrates.
Fig. 2 is the method flow diagram of equipment authentication method provided in an embodiment of the present invention, and in conjunction with shown in Fig. 2, the present invention carries The equipment authentication method of confession mainly includes the following steps:
Step 210, digital pen equipment obtains the position encoded image of substrate, generates position encoded data;
Wherein, position encoded data include the first digital signature of digital pen equipment.First digital signature is to be preset in In digital pen equipment, there are one the first digital signature for each digital pen equipment tool, and the first of each digital pen equipment is digital Signature is different.Can also be to be existed using the user of digital pen equipment specifically, can be preset before the manufacture of digital pen equipment Before use, it is preset in digital pen equipment.
The acquisition of position encoded image is not the primary whole coding patterns obtained in substrate, but according to digital pen The position encoded image of corresponding portion is obtained within the scope of the optical field of equipment.Specifically, having in position encoded image multiple The label symbol of label symbol for determining location information, different base can be different, for example can pass through triangle, circle Or square etc. indicates label symbol.
Step 220, digital pen equipment obtains the device identifier of digital pen equipment, and position coded data is encrypted Encrypted position encoded data and device identifier are sent to network interface device by processing;
Wherein, equipment indications are for identifying digital pen equipment, and equipment indications are before the manufacture of digital pen equipment It is arranged, and is stored in digital pen equipment;Device identifier may include one or more in number, letter or symbol. Each digital pen equipment has unique device identifier, and the device identifier of each digital pen equipment is different.
Network interface device is the port device of digital pen equipment access network, for example can be router.Digital pen is set Standby can be to be wirelessly connected between network interface device, can also be wired connection.
The transmission of encrypted position encoded data and device identifier can be the automatic trigger after encryption, Can also be that user triggers in digital pen equipment.
In a preferred embodiment, position encoded using symmetrical secret key pair in order to ensure the safety of position encoded data Data are encrypted.Specifically, before encryption, digital pen equipment generates symmetric key;It establishes and records symmetric key With the related information of device identifier;Symmetric key and device identifier are sent to inquiry service by network interface device Device;Inquiry server is recorded and is deposited to the incidence relation of the symmetric key and symmetric key and device identifier that receive Storage.
Further, the incidence relation of symmetric key and symmetric key and device identifier is stored in by inquiry server Secret key manages in library, and being associated with for all title keys and device identifier is stored in the secret key management library storage of inquiry server Relationship.
Step 230, encrypted position encoded data and device identifier are sent to inquiry server by network interface device;
Specifically, network interface device has interface identifier code;Network interface device is sending encrypted position encoded number While according to device identifier, the incidence relation of interface identifier code and device identifier is established, and incidence relation is sent Give inquiry server, inquiry server incidence relation is stored, such server when to digital pen equipment return information, Network interface device associated with digital pen equipment can be found.
Wherein, a network interface device can be associated with multiple digital pen equipment simultaneously, an interface identifier code with it is multiple Equipment indications can establish incidence relation simultaneously.
Step 240, inquiry server parses encrypted position encoded data, obtains the first digital signature, and root Inquire whether there is the first digital signature in the digital signature library of inquiry server according to digital signature;
Wherein, the first number label of registered all digital pen equipment are recorded in the digital signature library of inquiry server Name.
Specifically, inquiry server inquires corresponding symmetric key according to device identifier in secret key manages library, then It is decrypted according to the encrypted position encoded data of symmetrical secret key pair;To the position encoded data after decryption processing into line number According to parsing, to obtain the first digital signature in position encoded data;It is searched in the digital signature library of inquiry server again Whether there is the first digital signature.
When with when, execute step 250, inquiry server generates Authentication receipt and the second digital signature;
Specifically, the authentication data is generated based on the first digital signature, the second digital signature is phase with authentication data It is associated.There is Authentication receipt timestamp, inquiry server can add life cycle, the life cycle of timestamp to timestamp It can be set according to position encoded data, the life cycle of timestamp illustrates that Authentication receipt is in a period of time threshold value Interior to have timeliness, when beyond time threshold, Authentication receipt will be invalid, at the same time, the second digital signature is also invalid, to Ensure safety of the position encoded data in transmission process.
Server is inquired after generating Authentication receipt and the second digital signature, Authentication receipt and the second digital signature are carried out Storage.
After step 240, when digital signature library does not have the first digital signature, executes step 280 and serviced in inquiry The first digital signature is added in the digital signature library of device.
Step 260, inquiry server determines corresponding first business processing list according to the position encoded data that parsing obtains The information of member;
Wherein, the information of the first Service Processing Unit refers to the position encoded corresponding business processing list obtained with parsing The information of member.
Service Processing Unit is multiple in systems, and Service Processing Unit can be application server, at different business Managing unit can be different in performed processing function or flow, for example can be that corresponding different types of digital pen is set The digital pen equipment of standby either different software versions can also be the digital pen equipment for corresponding to setting different user types Etc..
In a specific example, inquiry server can be according to the marker character in the position encoded data that parsing obtains Number shape, determine the Service Processing Unit to match with substrate.For example, label symbol is triangle, square, circle, energy Identification and processing triangular marker symbol are the digital pen equipment of the first software version, the digital pen equipment with the first software version What is matched is the information of the first Service Processing Unit;It can identify and handle the number that square indicia symbol is the second software version Code equipment, with the digital pen equipment of the second software version match be the second Service Processing Unit information;Can identification and Processing circular mark symbol is the digital pen equipment of third software version, is matched with the digital pen equipment of third software version It is the information of third Service Processing Unit.
In another specific example, different functional areas, Mei Gequ can be divided into substrate according to different function The corresponding position encoded image in domain is different, and the position encoded data of generation are also different;Handle different location coded data Service Processing Unit is also different.Therefore, digital pen equipment is needed position encoded data transmission at corresponding business Reason unit is handled;Inquiry server determines corresponding Service Processing Unit according to the position encoded data that parsing obtains Information.
Step 270, the information of the first Service Processing Unit is sent to number by inquiry server by network interface device Equipment;And inquire server and the second digital signature is sent to the first Service Processing Unit so that the first business processing list The second digital signature of member pair stores;
Specifically, inquiry server inquires associated network interface device according to the device identifier of digital pen equipment Interface identifier code, the information of the first Service Processing Unit is transferred to by network interface device according to interface identifier code, network connects The information of first Service Processing Unit is sent to digital pen equipment by jaws equipment further according to device identifier, digital pen equipment according to Encrypted position encoded data are sent to the first Service Processing Unit by the information of the first Service Processing Unit.
Also, the second digital signature of generation is sent to the first Service Processing Unit by inquiry server, at the first business Reason unit stores the second digital signature received, and the first Service Processing Unit compiles position according to the second digital signature The first digital signature in code data is verified, and the processing of data could be carried out when being proved to be successful, to make at the first business Manage the position encoded data permission for the digital pen equipment that unit has processing corresponding.
In a preferred embodiment, the purview certification between digital pen equipment and application server can be with two-way, tool Body, after step 260, inquiry server generates third digital signature according to the information of the first Service Processing Unit;Inquiry Third digital signature is sent to digital pen equipment by server, and digital pen equipment is according to the first business processing of third digital signature pair Unit is verified.
Wherein, third digital signature is generated based on the first Service Processing Unit, the third that digital pen equipment will receive Digital signature is stored, and a digital pen can store one or more third digital signature, third number label as needed Name just has permission the digital pen equipment transmission data to storage third digital signature to corresponding application server;When application takes Be engaged in device by network interface device to digital pen equipment transmission data when, it is necessary to pass through the verification of third digital signature, digital pen Equipment could receive the data of application server transmission.
A kind of equipment authentication method provided in an embodiment of the present invention has decoupled the straight of digital pen equipment and service processing equipment Binding is connect, safety, convenience that digital pen equipment carries out data interaction with service processing equipment can be improved, simplification operated Journey improves compatibility and data-handling efficiency, and promotes user experience.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include Within protection scope of the present invention.

Claims (7)

1. a kind of equipment authentication method, which is characterized in that the equipment authentication method includes:
Digital pen equipment obtains the position encoded image of substrate, generates position encoded data;The position encoded data include First digital signature of the digital pen equipment;
The digital pen equipment obtains the device identifier of the digital pen equipment, and the position encoded data are encrypted Encrypted position encoded data and device identifier are sent to network interface device by processing;
The encrypted position encoded data and device identifier are sent to inquiry server by the network interface device;
The inquiry server parses the encrypted position encoded data, obtains first digital signature, and root Inquire whether there is first digital signature in the digital signature library of the inquiry server according to the digital signature;
When with when, the inquiry server generates Authentication receipt and the second digital signature, and the Authentication receipt has timestamp;
The inquiry server determines the information of corresponding first Service Processing Unit according to the position encoded data that parsing obtains;
The information of first Service Processing Unit is sent to described by the inquiry server by the network interface device Digital pen equipment compiles the encrypted position according to the information of first Service Processing Unit to the digital pen equipment Code data are sent to first Service Processing Unit;And
Second digital signature is sent to first Service Processing Unit by the inquiry server so that first industry Business processing unit stores second digital signature, to first Service Processing Unit according to second number Signature verifies the first digital signature in the position encoded data.
2. equipment authentication method according to claim 1, which is characterized in that the method further includes:
When not having first digital signature in the digital signature library of the inquiry server, in the inquiry server First digital signature is added in digital signature library.
3. equipment authentication method according to claim 1, which is characterized in that before the encryption, the method Further include:
The digital pen equipment generates symmetric key;
Establish and record the related information of the symmetric key and the device identifier;
The symmetric key and the device identifier are sent to the inquiry server by the network interface device;
The inquiry server is to the symmetric key received and the pass of the symmetric key and the device identifier Connection relationship is recorded and is stored.
4. equipment authentication method according to claim 3, which is characterized in that described to add to the position encoded data Close processing is specially:
The position encoded data are encrypted according to the symmetric key.
5. equipment authentication method according to claim 4, which is characterized in that the inquiry server is to the encrypted position Coded data is set to be parsed specially:
The encrypted position encoded data are decrypted according to the symmetric key in the inquiry server;
Data parsing is carried out to the position encoded data after decryption processing.
6. equipment authentication method according to claim 1, which is characterized in that obtained according to parsing in the inquiry server Position encoded data determine the information of corresponding first Service Processing Unit after, the method further includes:
The inquiry server generates third digital signature according to the information of first Service Processing Unit;
The third digital signature is sent to the digital pen equipment by the inquiry server, to the digital pen equipment root First Service Processing Unit is verified according to the third digital signature.
7. equipment authentication method according to claim 1, which is characterized in that the method further includes:To the timestamp Add life cycle.
CN201710215070.2A 2017-04-02 2017-04-02 Equipment authentication method Active CN108667610B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710215070.2A CN108667610B (en) 2017-04-02 2017-04-02 Equipment authentication method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710215070.2A CN108667610B (en) 2017-04-02 2017-04-02 Equipment authentication method

Publications (2)

Publication Number Publication Date
CN108667610A true CN108667610A (en) 2018-10-16
CN108667610B CN108667610B (en) 2021-05-25

Family

ID=63784479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710215070.2A Active CN108667610B (en) 2017-04-02 2017-04-02 Equipment authentication method

Country Status (1)

Country Link
CN (1) CN108667610B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960922A (en) * 2019-03-11 2019-07-02 北京三快在线科技有限公司 A kind of method and device identifying new activation equipment
CN115623472A (en) * 2022-09-08 2023-01-17 国网山东省电力公司电力科学研究院 Secure communication access method and system for power Internet of things

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11868608B1 (en) 2023-03-20 2024-01-09 Microsoft Technology Licensing, Llc Interposer for secure inking by stylus

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1557065A (en) * 2001-09-07 2004-12-22 阿诺托股份公司 Authentication receipt
WO2006062468A1 (en) * 2004-12-07 2006-06-15 Anoto Ab Methods and apparatuses for routing information to an application service
CN101063836A (en) * 2006-04-28 2007-10-31 富士施乐株式会社 Image forming apparatus and electronic document management method
CN101133418A (en) * 2004-10-12 2008-02-27 阿诺托股份公司 Method and a system for secure management of information from an electronic pen
CN101430808A (en) * 2007-11-09 2009-05-13 王巍 Fingerprint credit pen payment system, method and apparatus
US7788315B2 (en) * 2001-03-21 2010-08-31 Anoto Aktiebolag (Anoto Ab) Infrastructure for management and communication of information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7788315B2 (en) * 2001-03-21 2010-08-31 Anoto Aktiebolag (Anoto Ab) Infrastructure for management and communication of information
CN1557065A (en) * 2001-09-07 2004-12-22 阿诺托股份公司 Authentication receipt
CN101133418A (en) * 2004-10-12 2008-02-27 阿诺托股份公司 Method and a system for secure management of information from an electronic pen
WO2006062468A1 (en) * 2004-12-07 2006-06-15 Anoto Ab Methods and apparatuses for routing information to an application service
CN101063836A (en) * 2006-04-28 2007-10-31 富士施乐株式会社 Image forming apparatus and electronic document management method
CN101430808A (en) * 2007-11-09 2009-05-13 王巍 Fingerprint credit pen payment system, method and apparatus

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MUHAMMAD IMRAN MALIK: "《A Signature Verification Framework for Digital Pen Applications》", 《IEEE》 *
郭建辉: "《基于点降的数码纸编码及识别研究》", 《中国优秀硕士学位论文全文数据库》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960922A (en) * 2019-03-11 2019-07-02 北京三快在线科技有限公司 A kind of method and device identifying new activation equipment
CN109960922B (en) * 2019-03-11 2021-09-07 北京三快在线科技有限公司 Method and device for identifying newly activated equipment
CN115623472A (en) * 2022-09-08 2023-01-17 国网山东省电力公司电力科学研究院 Secure communication access method and system for power Internet of things
CN115623472B (en) * 2022-09-08 2024-02-02 国网山东省电力公司电力科学研究院 Safe communication access method and system of electric power Internet of things

Also Published As

Publication number Publication date
CN108667610B (en) 2021-05-25

Similar Documents

Publication Publication Date Title
US10245875B1 (en) Digitally encoded seal for document verification
CN107481140B (en) Voucher identification code processing method and system, server and storage medium
US8787969B2 (en) Using low-cost tags as a virtual storage medium for multimedia information
WO2018158102A1 (en) Integrated method and device for storing and sharing data
CN102647423B (en) The discrimination method of a kind of digital signature and seal and system
CN104268742A (en) Official seal fake detection method and device based on network digital certificate and network lookup
CN106600717B (en) A kind of method, system and smart machine based on the networking ticket checking of user terminal interface
CN108206831A (en) Implementation method and server, the client and readable storage medium storing program for executing of E-seal
CN101022339A (en) Electronic sign stamp identifying method combined with digital centifi cate and stamp
CN110113334B (en) Contract processing method and device based on block chain and storage medium
CN108667610A (en) A kind of equipment authentication method
CN111008366A (en) Copyright authorization method and device based on block chain
CN104834490B (en) Print control system and method based on E-seal
CN102298756A (en) Method for ensuring security of computer lottery trade information
JP2013528878A (en) Network platform system and management method thereof
CN108512660A (en) The verification method of virtual card
CN109885555B (en) User information management method and device
CN104517203A (en) Stamping method, apparatus and system of electronic stamp
CN108234126A (en) For the system and method remotely opened an account
CN105007273A (en) Data processing method and related device
CN104156646A (en) Terminal authentication method and equipment of file printing
JP3997197B2 (en) Image processing system
CN109547210B (en) Electronic seal verification method and device
CN103544444A (en) Method and system for achieving off-line printing limitation
CN201266495Y (en) Mobile memory with encipher function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200805

Address after: No.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing 100083

Applicant after: BEIJING TSTUDY TECHNOLOGY Co.,Ltd.

Address before: 100098, No. 2, building 18, North Third Ring Road, Haidian District, Beijing, 803-3

Applicant before: Tian Xuesong

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20211022

Address after: Room 701, unit 4, floor 5, xiujuyuan, Beiyuan Jiayuan, Chaoyang District, Beijing 100012

Patentee after: Tian Xuesong

Address before: 100083 no.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing

Patentee before: BEIJING TSTUDY TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220414

Address after: 100083 no.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing

Patentee after: BEIJING TSTUDY TECHNOLOGY CO.,LTD.

Address before: Room 701, unit 4, floor 5, xiujuyuan, Beiyuan Jiayuan, Chaoyang District, Beijing 100012

Patentee before: Tian Xuesong

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230310

Address after: 100044 04-758, floor 8, No. 18, Zhongguancun Street, Haidian District, Beijing

Patentee after: BEIJING QILU MANAGEMENT CONSULTING Co.,Ltd.

Address before: 100083 no.1108, 11th floor, Gaode building, No.10 Huayuan East Road, Haidian District, Beijing

Patentee before: BEIJING TSTUDY TECHNOLOGY CO.,LTD.