CN108702622A - Mobile network's access authentication method, device, storage medium and block chain node - Google Patents
Mobile network's access authentication method, device, storage medium and block chain node Download PDFInfo
- Publication number
- CN108702622A CN108702622A CN201780006171.7A CN201780006171A CN108702622A CN 108702622 A CN108702622 A CN 108702622A CN 201780006171 A CN201780006171 A CN 201780006171A CN 108702622 A CN108702622 A CN 108702622A
- Authority
- CN
- China
- Prior art keywords
- block chain
- user equipment
- authentication
- certificate server
- identity information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Abstract
A kind of mobile network's access authentication method, device, storage medium and block chain node, to solve the relatively low technical problem of existing mobile network's access authentication technique reliability.The method certificate server, certificate server are the nodes in block chain network, and this method includes:The certification request that user equipment is sent is received, certification request includes the first block chain address and identity information;Block chain is inquired according to the first block chain address, determines whether block chain stores the authentication information being consistent with identity information, wherein the support system of mobile network, will be in the authentication information write-in block chain of user equipment in user equipment registration;When being stored with the authentication information being consistent with identity information in block chain, user equipment is authenticated based on identifying algorithm, wherein if certification success, show that the user equipment is the target UE that the identity information indicates.
Description
Technical field
This disclosure relates to information technology field more particularly to a kind of mobile network's access authentication method, device, storage medium
And block chain node.
Background technology
Currently, the access authentication of mobile network is controlled by the operator of mobile network, by taking 4G networks as an example, connect
Entering identifying procedure is specially:(Home Subscriber Server, ownership signing are used by operators issue SIM card, SIM card and HSS
Family server) in prestore symmetric key, when SIM card user equipment is attached to mobile network, MME (Mobility
Management Entity, mobile management entity) to HSS transmission authentication information requests, HSS generates authentication using symmetric key
Collection (including random number and desired challenge responses XRES) is simultaneously sent to MME, and MME carries random to the transmission of SIM card user equipment
Several authentication requests, and receive user terminal challenge of the SIM card user equipment based on the symmetric key and generating random number to prestore and ring
RES is answered, if the user terminal challenge responses RES received is consistent with the expectation challenge responses XRES that authentication is concentrated, access authentication
Success.
By above-mentioned flow it is found that the server that HSS is disposed as subregion centralization, if it goes wrong and stops taking
Business, will cause user equipment that ownership place is the regions HSS can not access to mobile network, influence mobile network's access authentication can
By property.
Invention content
It is a general object of the present disclosure to provide a kind of mobile network's access authentication method and devices, to solve existing mobile network
The relatively low technical problem of reliability caused by being disposed due to centralization in network access technology.
To achieve the goals above, disclosure first aspect provides a kind of mobile network's access authentication method, the method
Applied to certificate server, the certificate server is the node in block chain network, the method includes:
The certification request that user equipment is sent is received, the certification request includes that the first block chain address and identity are believed
Breath;
The block chain is inquired according to the first block chain address, determines whether the block chain stores and the identity
The authentication information that information is consistent, wherein the support system of mobile network is in user equipment registration, by the body of user equipment
In part verification information write-in block chain, if being stored with the authentication information being consistent with the identity information in the block chain,
Then show the target UE of the identity information expression in mobile network register;
When being stored with the authentication information being consistent with the identity information in the block chain, it is based on identifying algorithm pair
The user equipment is authenticated, wherein if certification success, shows that the user equipment is the mesh that the identity information indicates
Mark user equipment.
Disclosure second aspect provides a kind of mobile network's access authentication method, and the method is applied to user equipment, institute
It is the node in block chain network to state user equipment, the method includes:
Certification request is sent to certificate server, the certification request includes the first block chain address and identity information,
The first block chain address and the identity information confirm the target that the identity information indicates for the certificate server
Whether user equipment is in mobile network register;
Confirming that target UE that the identity information indicates after the mobile network register, calculated based on certification
Method completes the authentication to the user equipment with the certificate server, wherein if certification success, shows the user
Equipment is the target UE that the identity information indicates.
The disclosure third aspect provides a kind of mobile network's access authentication device, and described device is applied to certificate server,
The certificate server is the node in block chain network, and described device includes:First receiving module, for receiving user equipment
The certification request of transmission, the certification request include the first block chain address and identity information;Enquiry module, for according to institute
It states the first block chain address and inquires the block chain, determine whether the block chain stores the identity being consistent with the identity information
Verification information, wherein the authentication information of user equipment is written in user equipment registration for the support system of mobile network
In block chain, if being stored with the authentication information being consistent with the identity information in the block chain, show the identity
The target UE that information indicates is in mobile network register.
First authentication module, for being stored with the authentication information being consistent with the identity information in the block chain
When, the user equipment is authenticated based on identifying algorithm, wherein if certification success, shows the user equipment for institute
State the target UE of identity information expression.
Disclosure fourth aspect provides a kind of mobile network's access authentication device, and described device is applied to user equipment, institute
It is the node in block chain network to state user equipment, and described device includes:
Second sending module, for sending certification request to certificate server, the certification request includes the first block chain
Address and identity information, the first block chain address and the identity information confirm the body for the certificate server
Whether the target UE that part information indicates is in mobile network register;
Second authentication module, for confirming the target UE of the identity information expression in the mobile network
After registration, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification at
Work(then shows that the user equipment is the target UE that the identity information indicates.
The 5th aspect of the disclosure provides a kind of non-transitorycomputer readable storage medium, and the non-transitory computer can
It includes one or more programs to read storage medium, and one or more of programs are for executing described in disclosure first aspect
Method.
The 6th aspect of the disclosure provides a kind of block chain node, including:
Non-transitorycomputer readable storage medium described in the 5th aspect of the disclosure;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
The 7th aspect of the disclosure provides a kind of non-transitorycomputer readable storage medium, and the non-transitory computer can
It includes one or more programs to read storage medium, and one or more of programs are for executing described in disclosure second aspect
Method.
Disclosure eighth aspect provides a kind of block chain node, including:
Non-transitorycomputer readable storage medium described in the 7th aspect of the disclosure;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
Using above-mentioned technical proposal, block chain is written in mobile network register by inquiring user equipment for certificate server
Authentication information verifying user equipment whether in mobile network register, and confirm user equipment in mobile network register
Afterwards, user equipment is authenticated based on identifying algorithm, in this way, what the decentralization of block chain can be disposed to avoid centralization
HSS goes wrong and access authentication is caused to be affected, and improves the reliability of mobile network's access authentication.
Other feature and advantage of the disclosure will be described in detail in subsequent specific embodiment part.
Description of the drawings
In order to illustrate more clearly of the embodiment of the present disclosure or technical solution in the prior art, embodiment will be described below
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description be the present invention some realities
Example is applied, it for those of ordinary skill in the art, without creative efforts, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of stream for mobile network's access authentication method applied to certificate server that the embodiment of the present disclosure provides
Cheng Tu;
Fig. 2 is a kind of flow for mobile network's access authentication method applied to user equipment that the embodiment of the present disclosure provides
Figure;
Fig. 3 is a kind of flow chart of the certificate server that provides of the embodiment of the present disclosure to the method for user equipment certification;
Fig. 4 is a kind of flow chart of the user equipment that provides of the embodiment of the present disclosure to the method for certificate server certification;
Fig. 5 is a kind of schematic diagram for implementation environment that the embodiment of the present disclosure provides;
Fig. 6 is a kind of flow diagram for mobile network's access authentication method that the embodiment of the present disclosure provides;
Fig. 7 is a kind of knot for mobile network's access authentication device applied to certificate server that the embodiment of the present disclosure provides
Structure schematic diagram;
Fig. 8 is mobile network's access authentication device that the another kind that the embodiment of the present disclosure provides is applied to certificate server
Structural schematic diagram;
Fig. 9 is a kind of structure for mobile network's access authentication device applied to user equipment that the embodiment of the present disclosure provides
Schematic diagram;
Figure 10 is mobile network's access authentication device that the another kind that the embodiment of the present disclosure provides is applied to user equipment
Structural schematic diagram;
Figure 11 is a kind of structural schematic diagram for block chain node that the embodiment of the present disclosure provides;
Figure 12 is the structural schematic diagram for another block chain node that the embodiment of the present disclosure provides.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present disclosure clearer, below in conjunction with the embodiment of the present disclosure
In attached drawing, the technical solution in the embodiment of the present disclosure is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
In order to make those skilled in the art be easier to understand the technical solution of embodiment of the present disclosure offer, first below to relating to
And to the relevant technologies simply introduced.
Block chain is the decentralization distributed data base system for being participated in safeguarding jointly by all nodes in block chain network,
It is by a series of data chunks generated based on cryptography method at each data block is a block in block chain.
According to the sequencing of generation time, block is linked together in an orderly manner, forms a data chain, is visually known as area
Block chain.Block chain is generated by its special block and transaction, indentification protocol can not be forged, can be traced completely with that can not change
Security feature.
The related notion explanation arrived involved in block chain technology:
Block chain node:Block chain network is based on P2P (Peer to Peer, peer-to-peer network) network, each participates in business
All it is the node in a block chain network with block storage, the P2P network nodes verified, forwarded.
User identity:User identity in block chain is indicated using public key, and public key and private key occur in pairs,
In, private key is grasped by user without being published in above-mentioned block chain network, and public key after specific Hash and coding by becoming
" address ", " address " represents user, and public key and " address " can arbitrarily issue in block chain network.It is worth mentioning
It is that one-to-one relationship is not present in user identity and block chain node, and user can use on any one block chain node
The private key of oneself.
Block chain data are written:Block chain node to block chain network publication " transaction " (Transaction) by realizing
Data are written to block chain.Signature of oneself private key to transaction is used comprising user in transaction, to prove the identity of user.Transaction
The new block of generation is recorded by " miner " (the block chain node for executing PoW block chains common recognition competition mechanism), is then published to
Block chain network, and by other block chain node verifications by the way that with after receiving, transaction data is written into block chain.
The embodiment of the present disclosure is based on block chain technology and provides a kind of mobile network's access authentication method, and this method is applied to recognize
Server is demonstrate,proved, as shown in Figure 1, this method includes:
In step S101, the certification request that user equipment is sent is received, which includes the first block chain address
And identity information.
In step s 102, block chain is inquired according to the first block chain address, determines whether stored in block chain and identity
The authentication information that information is consistent.
Wherein, certificate server is the node in block chain network, is stored with the block chain being made of multiple blocks, each
Block is for storing information, it is ensured that the certificate server at least has the function of participating in block chain query.
In addition, user equipment can be noted by the support system of mobile network in mobile network before access to mobile network
Volume, wherein the support system of mobile network is the node in block chain network, is stored with the block chain being made of multiple blocks,
Each block is for storing information, it is ensured that the support system at least has the function of participating in the transaction of block chain.User equipment
Registration process is:Its authentication information is sent to support system by user equipment, which may include user
Address of the public key and user equipment of equipment in block chain network, support system test the identity of the user equipment received
Card information is written in block chain, in this way, the block chain address based on user equipment can inquire the category stored in block chain
All information under the user equipment account may further determine whether stored in all information under the account and identity
The authentication information that information is consistent.In addition, the system of support can also send the starter node bootnode information of block chain
To user equipment, block chain network is accessed so that user equipment is based on block chain agreement according to the bootnode information.
In a kind of possible realization method of the embodiment of the present disclosure, mobile network can be only allowed in the block chain network
The authentication information of user equipment is written into block chain for the support system of network or other nodes of the support system authorization,
For example, the block chain can be a license chain, Mobile Network Operator can license to node trusty and be carried for user equipment
For registration service.
The authentication information of user equipment itself may include the public key of user equipment itself, IMSI
The letters such as (International Mobile Subscriber Identity, international mobile subscriber identity), ownership place, state
Breath.Then the identity information of user equipment can be the IMSI of user equipment.Illustratively, it is it with the identity information of user equipment
IMSI illustrates, and certificate server inquires block chain according to the first block chain address, exists under the first block chain address if inquiring
The IMSI of the user equipment and IMSI is effective, then can determine user equipment in mobile network register.
Optionally, if the block chain address in the certification request that certificate server is sent according to user equipment does not inquire area
There is the authentication information that is consistent with the identity information in certification request in block chain or inquire present in block chain with
When the authentication information that identity information in certification request is consistent is invalid, then show the user equipment not in mobile network register
Or it is canceled, thus can be with certification request described in refusal respond.
In step s 103, it when being stored with the authentication information being consistent with identity information in determining block chain, is based on
Identifying algorithm is authenticated user equipment, wherein if certification success, shows that the user equipment is the mesh that identity information indicates
Mark user equipment.
When being stored with the authentication information being consistent with identity information in determining block chain, certificate server can be based on recognizing
Algorithm is demonstrate,proved, interacting completion with user equipment is authenticated user equipment, avoids the user not in mobile network register
Equipment puppet emits the identity information access to mobile network of the user equipment in mobile network register.
In this way, the technical solution provided using the embodiment of the present disclosure, due to node (such as existing skill without disposing centralization
HSS in art) access authentication is participated in, therefore can be to avoid centralization node stops service and causes user equipment that can not access shifting
The problem of dynamic network, occurs, and improves the reliability of access authentication.Meanwhile it can be with the complexity of center of reduction node.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication method, and this method is applied to user equipment, such as Fig. 2
Shown, this method includes:
In step s 201, to certificate server send certification request, certification request include the first block chain address and
Identity information, the first block chain address and identity information confirm the target UE that identity information indicates for certificate server
Whether in mobile network register.
In step S202, confirming that target UE that identity information indicates after mobile network register, is based on
Identifying algorithm completes the authentication to user equipment with certificate server, wherein if certification success, shows the user equipment
The target UE indicated for identity information.
Wherein, user equipment can be connected to certificate server according to attachment flow, and according to starter node information, pass through area
Block chain link agreement is connected to block chain network for example, by using the mode of light node protocol or RPC.
It is worth noting that in existing mobile network's attachment flow, it is that can not access that user equipment, which does not complete certification,
Mobile network's, to also cannot connect in block chain network.It therefore, in order to solve this problem, in the present invention, can be by area
Block chain node is deployed in core net, and gives tacit consent to network communication energy of the open user equipment to the block chain node in core net
Power.
In addition, user equipment is completed in the registration process of mobile network and based on identifying algorithm and certificate server to it
The process of authentication is referred to the description to Fig. 1 mobile network's access authentication methods provided, and details are not described herein again.
In order to avoid the user key for the HSS storages being susceptible in symmetric encipherment algorithm in the prior art is lost and cause
The safety problem that user equipment is counterfeited, in the embodiment of the present disclosure, certificate server and user equipment can be based on it is asymmetric plus
Close algorithm carries out two-way authentication, i.e., user equipment is authenticated including certificate server and user equipment to certificate server into
Row certification.Next, the two certifications are described in detail by specific embodiment.
In one possible implementation, the identity information of user equipment may include the first public key (i.e. user equipment
The public key of oneself).Correspondingly, as shown in figure 3, certificate server is authenticated method to user equipment, including:
In step S301, certificate server sends the first authentication challenge to user equipment, and the first authentication challenge includes the
One random number.
In step s 302, user equipment is signed according to its first random number of private key pair, obtains the first signing messages.
In step S303, the first authentication challenge response including the first signing messages is sent to certification and taken by user equipment
Business device.
In step s 304, certificate server carries out signature verification according to first the first signing messages of public key pair.
Using the above method, user equipment is in mobile network register by the support system of mobile network by its public key
(the first public key) is written in block chain, and certificate server is inquired block chain according to the first block chain address of user equipment and can be obtained
To first public key.In this way, certificate server after obtaining the first public key, can send user equipment according to first public key
The first signing messages carry out signature authentication, can determine that the user equipment of request certification has been grasped and the if signature authentication success
Thus the corresponding private key of one public key can be shown that the user equipment is the target UE that identity information indicates.
Since the information being written in block chain has the characteristic that can not be distorted, so that certificate server can be according to true
Real believable first public key, whether verifying user equipment is that its identity information indicates target UE, to ensure that user
Equipment can not pretend to be.
In alternatively possible embodiment, the certification request that user equipment is sent can also include the second random number,
Correspondingly, as shown in figure 4, user equipment includes to the method that certificate server is authenticated:
In step S401, certificate server is signed according to its second random number of private key pair, obtains the second A.L.S.
Breath.
In step S402, certificate server is by the second block chain including the second signing messages and certificate server
The second authentication challenge response of location is sent to user equipment.
In step S403, user equipment inquires the public key of certificate server according to the second block chain address from block chain
And signature verification is carried out to the second signing messages.
Wherein, the public key of certificate server can also be that block chain, example is written by support system in mobile network register
As certificate server firstly generates the private key and public key that occur in pairs, and pass through public key is passed through it is raw after specific Hash and coding
At the second block chain address.Wherein, private key is grasped by their own without being published in network, and it includes it to be sent to the system of support
When support system receives the second certification request block chain is written in the public key of certificate server by the second certification request of public key
In, certificate server just completes the registration of block chain network as a result,.
Using the above method, its public key is written to area by certificate server in registration by the support system of mobile network
In block chain, user equipment inquires the public affairs that certificate server can be obtained in block chain according to the second block chain address of certificate server
Key.In this way, user equipment carries out signature authentication according to the public key of certificate server to the second signing messages of certificate server, if
Signature authentication success then can determine that the certificate server of request certification has grasped private key corresponding with the public key, thus can be shown that this
Certificate server is legal.
Since the information being written in block chain has the characteristic that can not be distorted, so that user equipment can be according to true
Whether the certificate server of the public key of believable certificate server, checking request certification is legal, to ensure that certificate server
It can not pretend to be.
For the technical solution for making those skilled in the art more understand that the embodiment of the present disclosure provides, below to combine Fig. 5
Illustrate mobile network's access authentication method that the embodiment of the present disclosure provides.
Fig. 5 is a kind of schematic diagram for implementation environment that the embodiment of the present disclosure provides, as shown in figure 5, the implementation environment includes
The support system 503 of user equipment 501, certificate server 502 and mobile network, wherein certificate server 502 can be
ENodeB or MME (Mobility Management Entity, mobile management entity), the support system 503 of mobile network
Can be OSS (Operation Support System, Operation Support System) or BSS (Business Support
System, business support system), and eNodeB, MME, user equipment (UE), OSS/BSS are the node in block chain network.Knot
Fig. 5 is closed, a kind of mobile network's access authentication method that the embodiment of the present disclosure provides is as shown in fig. 6, include:
In step s 601, user equipment 501 sends the first registration request to the support system 503 of mobile network, this
One registration request includes the authentication information of user equipment 501.
In step S602, block is written in the authentication information of user equipment 501 by the support system 503 of mobile network
In chain.
In step S603, the starter node information of block chain is sent to user equipment 501 by support system 503.
In step s 604, certificate server 502 sends the second registration request to the support system 503 of mobile network, should
Second registration request includes the public key of certificate server 502.
In step s 605, support system 503 will be in the public key write-in block chain of certificate server 502.
It should be understood that user equipment and certificate server are registered as two independent processes, it is not first by time and step
The limitation of sequence afterwards, above method step are intended merely to be briefly described.
In step S606, user equipment 501 is connected to certificate server 502 according to attachment flow.
After user equipment 501 and certificate server 502 complete registration, user equipment 501 may be coupled to certification clothes
Certification on business device 502.Wherein, user equipment (UE) may be coupled on eNodeB and be authenticated, and can also be connected on MME and carry out
Certification, that is to say, that the certificate server described in the disclosure is specifically as follows eNodeB or MME.It is worth noting that
The upper certifications of eNodeB can reduce the information exchange between eNodeB and MME, save resources of core network, and reduce core network protocols
Complexity.
In step S607, user equipment 501 sends certification request to certificate server 502.
Wherein, certification request may include the first block chain address ADDRESS (A) of user equipment 501, identity information and
Second random parameter RAND (A).In this embodiment, illustrate by the public key PK (A) of user equipment 501 of identity information.
In step S608, certificate server 502 inquires block chain according to the first block chain address, and determining in block chain is
It is no to store the authentication information being consistent with identity information.
Certificate server 502 inquires block chain according to ADDRESS (A), obtains the authentication information stored in block chain,
If there is PK (A) in the authentication information, show the identity information phase that the authentication information is sent with user equipment 501
Symbol, it may be determined that the target UE of identity information mark is in mobile network register, further, executes step S609;
It is stored with the authentication information being consistent with the identity information of user equipment in block chain or is deposited in block chain if not inquiring
When the authentication information of storage being consistent with the identity information of user equipment is invalid, then show the user equipment not in mobile network
Registration is canceled, then the certification request of refusal respond user equipment 501, terminates the certification to user equipment 501.
In step S609, certificate server 502 is chosen to the first certification that the transmission of user equipment 501 includes the first random number
War.
After being stored with the authentication information being consistent with identity information in confirming block chain, certificate server 502 generates
First random parameter RAND (B) and to user equipment 501 send include RAND (B) the first authentication challenge.
In step S610, user equipment 501 is signed according to its first random number of private key pair, obtains the first A.L.S.
Breath.
In step s 611, the first authentication challenge response including the first signing messages is sent to and recognizes by user equipment 501
Demonstrate,prove server 502.
In step S612, certificate server 502 carries out signature verification according to first the first signing messages of public key pair.
As described above, certificate server 502 inquires block chain according to the first block chain address ADDRESS (A) obtains user
The public key PK (A) of equipment 501 verifies the first signing messages SIGN (A) according to public key PK (A), if signature verification success,
Then show that user equipment 501 grasps private key corresponding with the public key PK (A), therefore can determine that user equipment 501 is identity information
The target UE of expression, thens follow the steps S613;Otherwise, it may be determined that user equipment 402 is spoofed, then terminates to set user
Standby 501 certification.
Since the information being written in block chain has the characteristic that can not be distorted, so that certificate server 502 can root
According to genuine and believable public key PK (A), verifying user equipment 402 whether be identity information indicate target UE, to protect
Having demonstrate,proved user equipment 402 can not pretend to be.
In step S613, certificate server 502 is signed according to its second random number of private key pair, obtains the second signature
Information.
In step S614, certificate server 502 will include the second block of the second signing messages and certificate server
The second authentication challenge response of chain address is sent to user equipment 501.
In step S615, user equipment 501 inquires certificate server according to the second block chain address from block chain
Public key simultaneously carries out signature verification to the second signing messages.
After user equipment 501 is by certification, certificate server 502 is according to the second random parameter RAND of private key pair of oneself
(A) it signs, obtain the second signing messages SIGN (B) and carries the second signing messages SIGN to the transmission of user equipment 501
(B) it is responded with the second authentication challenge of the second block chain address ADDRESS (B).
User equipment 501 inquires block chain according to ADDRESS (B), obtains the certificate server stored in block chain 502
Public key PK (B), and the second signing messages SIGN (B) is verified according to public key PK (B).If signature verification success, shows
Certificate server 502 grasps private key corresponding with the public key PK (B), therefore can determine that certificate server 502 is legal;Otherwise, may be used
Determine that certificate server 502 is spoofed.
Since the information being written in block chain has the characteristic that can not be distorted, so that user equipment 501 can basis
Genuine and believable public key PK (B), whether authentication verification server 502 is legal, to ensure that certificate server 502 can not emit
It fills.
After the second signing messages is proved to be successful, user equipment 501 just completes the certification to certificate server 502.
It is worth noting that for above method embodiment, for simple description, therefore it is all expressed as a series of dynamic
It combines, but those skilled in the art should understand that, the present invention is not limited by the described action sequence.Secondly, originally
Field technology personnel should also know that embodiment described in this description belongs to preferred embodiment, and involved action is simultaneously
It is not necessarily necessary to the present invention.
In addition, in embodiment of the disclosure, due to the user equipment information and certificate server recorded in block chain
Information is the critical data of access authentication, and addition and modification must be controlled by permission, to realize the protection that data are written.
Therefore, in one embodiment of the embodiment of the present disclosure, license chain can be used in block chain, i.e., different operators has respective
Permit chain, it is node on the license chain respectively to belong to the certificate server of same operator and user equipment.In license chain
In permission control, whether limitation different blocks chain account has write-in and the modification authority to certain data.For example, to mobile network
Block chain account in the support system of network only configures write-in and modification authority, and to the area on user equipment and certificate server
Block chain account, which only configures, reads permission.
In another embodiment, information can be realized by the intelligence contract by writing specific intelligent contract
Storage.Intelligent contract provides registration, modification, nullifies, the interfaces such as inquiry, and by the tune of the interfaces such as registration, modification, cancellation, inquiry
Be only assigned to the block chain account in the support system of mobile network with permission, and pair on user equipment and certificate server
Block chain account only distributes the permission of query interface calling.
Wherein, intelligent contract is one section of executive program, and satisfaction can be executed accurately automatically, the intelligence based on block chain
Contract includes the mechanism and a complete state machine of issued transaction and preservation, for receiving and handling various intelligent contracts.
If some in automatic state machine or the trigger condition of certain several action meet, contract is selected according to presupposed information by state machine
Action is automatic to be executed.
In addition, it is contemplated that certificate server may belong to different operators from user equipment, each operator has each
From license chain, when user equipment needs cross operator roaming authentication, need on certain nodes block chain account provide
The ability of a plurality of chain is accessed simultaneously.Such as when the user equipment of A operators needs to roam into the mobile network of B operators, A fortune
Battalion quotient needs to provide the access ability of the block chain of A operators to B operators, to allow the certificate server of B operators can
Access the relevant information in A operators block chain.In this way, its ownership must be arrived in compared with the existing technology when user's set roaming
The certification nearby when user's set roaming may be implemented in the generation that authentication collection is carried out on the HSS on ground, improves access authentication efficiency.
In one embodiment, for above-mentioned block chain be privately owned chain the case where, A operators can give B operators correlation
Block chain account configures access and digital independent permission, the specific address of the license chain of A operators, can match for B operators
Set the full node of required amount of license chain.
It in another embodiment, for above-mentioned intelligent contract the case where, can be by the calling authority configuration of query interface to B
The required block chain account of operator.
As a result, compared with the existing technology in user's set roaming when must be to being recognized in the third-party institution of its ownership place
The generation for demonstrate,proving information, can improve the efficiency of mobile network's access authentication.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication device 70, which is applied to authentication service
Device, wherein certificate server is the node in block chain network, as shown in fig. 7, the device 70 includes:
First receiving module 71, the certification request for receiving user equipment transmission, the certification request include the firstth area
Block chain address and identity information.
Enquiry module 72 determines that the block chain is for inquiring the block chain according to the first block chain address
It is no to store the authentication information being consistent with the identity information, wherein the support system of mobile network is in user equipment registration
When, the authentication information of user equipment is written in block chain, if being stored in the block chain and the identity information phase
The authentication information of symbol then shows the target UE of the identity information expression in mobile network register.
First authentication module 73, for being stored with the authentication being consistent with identity information letter in the block chain
When breath, the user equipment is authenticated based on identifying algorithm, wherein if certification success, shows that the user equipment is
The target UE that the identity information indicates.
Optionally, as shown in figure 8, first authentication module 73 includes:
First authentication sub module 731, for carrying out two-way authentication based on rivest, shamir, adelman and the user equipment.
Optionally, as shown in figure 8, the authentication information includes the first public key, first authentication module includes:
First sending submodule 732, for sending the first authentication challenge, first authentication challenge to the user equipment
Including the first random number;
First receiving submodule 733, the first authentication challenge response sent for receiving the user equipment, described first
Authentication challenge response includes the first signing messages, wherein first signing messages is the private key signature institute of the user equipment
State what the first random number obtained;
First signature verification submodule 734, for being signed to first signing messages according to first public key
Verification, wherein show that the user equipment is the target UE that the identity information indicates if signature verification success.
Optionally, as shown in figure 8, the certification request further includes the second random number;
Described device 70 further includes:
First signature blocks 74, for being signed to second random number according to the private key of the certificate server,
Obtain the second signing messages;
First sending module 75, for that will include the second block of second signing messages and the certificate server
The second authentication challenge response of chain address is sent to the user equipment, and the second block chain address is used for the user equipment
It inquires public key from the block chain to verify second signing messages, wherein the public key of the certificate server is
The support system is written in the block chain.
Optionally, as shown in figure 8, described device 70 further includes:
Refusal respond module 76, for there is no the identity information phases with the user equipment in confirming the block chain
The authentication being consistent with the identity information of the user equipment stored in the authentication information of symbol or the block chain
When information is invalid, certification request described in refusal respond.
It is affiliated that it will be apparent to those skilled in the art ground to recognize, for convenience and simplicity of description, the dress of foregoing description
The specific work process for each module set can refer to corresponding process in preceding method embodiment, and details are not described herein again.
In addition, the above-mentioned division carried out to device comprising modules, only a kind of division of logic function in actual implementation can be with
There is other dividing mode.Also, the physics realization of modules can also there are many modes, the present invention not to limit this.
The embodiment of the present disclosure also provides a kind of mobile network's access authentication device 80, which is applied to user equipment,
Wherein, user equipment is the node in block chain network, as shown in figure 9, the device 80 includes:
Second sending module 81, for sending certification request to certificate server, the certification request includes the first block
Chain address and identity information, the first block chain address and the identity information are for described in certificate server confirmation
Whether the target UE that identity information indicates is in mobile network register;
Second authentication module 82, for confirming the target UE of the identity information expression in the mobile network
After network registration, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification
Success then shows that the user equipment is the target UE that the identity information indicates.
Optionally, as shown in Figure 10, second authentication module 82 includes:
Second receiving submodule 821, the first authentication challenge sent for receiving the certificate server, described first recognizes
Card challenge includes the first random number;
First signature submodule 822, for being signed to first random number according to the private key of the user equipment,
Obtain the first signing messages;
Second sending submodule 823, the first authentication challenge response for that will include first signing messages are sent to
The certificate server, wherein first signing messages is authenticated the user equipment for the certificate server.
Optionally, as shown in Figure 10, the certification request further includes the second random number;
Described device 80 further includes:
Second receiving module 83, the second authentication challenge response sent for receiving the certificate server, described second
Authentication challenge response includes the second block chain address of the second signing messages and the certificate server, wherein described second
Signing messages is that the second random number described in the private key signature of the certificate server obtains;
First signature verification module 84, for recognizing described in being inquired from the block chain according to the second block chain address
It demonstrate,proves the public key of server and signature verification is carried out to second signing messages, wherein show if signature verification success described
Certificate server is legal.
Optionally, as shown in Figure 10, described device 80 further includes:
Third sending module 85, for sending registration request to the support system of mobile network, the registration request includes
The authentication information of the user equipment, wherein the support system is the node in block chain network;
Second receiving module 86, the starter node information for receiving the block chain that the support system is sent, institute
It states starter node information and is based on block chain agreement access block chain network for the user equipment.
It is affiliated that it will be apparent to those skilled in the art ground to recognize, for convenience and simplicity of description, the dress of foregoing description
The specific work process for each module set can refer to corresponding process in preceding method embodiment, and details are not described herein again.
In addition, the above-mentioned division carried out to device comprising modules, only a kind of division of logic function in actual implementation can be with
There is other dividing mode.Also, the physics realization of modules can also there are many modes, the present invention not to limit this.
Correspondingly, the embodiment of the present disclosure also provides a kind of non-transitorycomputer readable storage medium, the non-transitory
Computer readable storage medium includes one or more program, one or more of programs for right of execution above application in
Mobile network's access authentication method of certificate server.
Correspondingly, the embodiment of the present disclosure also provides a kind of block chain node, including above-mentioned non-transitory is computer-readable deposits
Storage media;And one or more processor, for executing the program in the non-transitorycomputer readable storage medium.
Correspondingly, the embodiment of the present disclosure also provides a kind of non-transitorycomputer readable storage medium, the non-transitory
Computer readable storage medium includes one or more program, one or more of programs for right of execution above application in
Mobile network's access authentication method of user equipment.
Correspondingly, the embodiment of the present disclosure also provides a kind of block chain node, including above-mentioned non-transitory is computer-readable deposits
Storage media;And one or more processor, for executing the program in the non-transitorycomputer readable storage medium.
The embodiment of the present disclosure also provides a kind of block chain node 90, which can be certification as described above
Server, such as eNodeB or MME, as shown in figure 11, the block chain node 90 include processing component 922, are further comprised
One or more processors, and by the memory resource representated by memory 932, it can be by processing component 922 for storing
The instruction of execution, such as application program.The application program stored in memory 932 may include one or more each
A module for corresponding to one group of instruction.In addition, processing component 922 is configured as executing instruction, connect with executing above-mentioned mobile network
Enter authentication method.
Block chain node 90 can also include that a power supply module 926 is configured as executing the power supply pipe of block chain node 90
Reason, a wired or wireless network interface 950 are configured as block chain node 90 being connected to network and an input and output
(I/O) interface 958.Block chain node 90 can be operated based on the operating system for being stored in memory 932, such as Windows
ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The embodiment of the present disclosure also provides a kind of block chain node 100, which can use as described above
Family equipment, such as mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, medical treatment
Equipment, body-building equipment, personal digital assistant etc..
As shown in figure 12, which may include following one or more components:Processing component 102, storage
Device 104, electric power assembly 106, multimedia component 108, audio component 110, the interface 112 of input/output (I/O), sensor group
Part 114 and communication component 116.
The integrated operation of the usually control block chain link point 100 of processing component 102, such as with display, call, data are logical
Letter, camera operation and record operate associated operation.Processing component 102 may include one or more processors 120 to hold
Row instruction, to complete all or part of step of above-mentioned mobile network's access authentication method.In addition, processing component 102 can be with
Including one or more modules, convenient for the interaction between processing component 102 and other assemblies.For example, processing component 102 can wrap
Multi-media module is included, to facilitate the interaction between multimedia component 108 and processing component 102.
Memory 104 is configured as storing various types of data to support the operation in block chain node 100.These numbers
According to example include any application program or method for being operated on block chain node 100 instruction, contact data, electricity
Talk about book data, message, picture, video etc..Memory 104 can by any kind of volatibility or non-volatile memory device or
Person's combination thereof is realized, such as static RAM (SRAM), electrically erasable programmable read-only memory (EEPROM),
Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic storage
Device, flash memory, disk or CD.
Electric power assembly 106 provides electric power for the various assemblies of block chain node 100.Electric power assembly 106 may include power supply
Management system, one or more power supplys and other with for block chain node 100 generate, management and distribution associated group of electric power
Part.
Multimedia component 108 is included in the screen of one output interface of offer between the block chain node 100 and user
Curtain.In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touching
Panel, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touches
Sensor is touched to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or cunning
The boundary of action, but also detect duration and pressure associated with the touch or slide operation.In some embodiments
In, multimedia component 108 includes a front camera and/or rear camera.When block chain node 100 is in operation mould
Formula, when such as screening-mode or video mode, front camera and/or rear camera can receive external multi-medium data.
Each front camera and rear camera can be a fixed optical lens system or have focal length and an optical zoom energy
Power.
Audio component 110 is configured as output and/or input audio signal.For example, audio component 110 includes a Mike
Wind (MIC), when block chain node 100 is in operation mode, when such as call model, logging mode and speech recognition mode, Mike
Wind is configured as receiving external audio signal.The received audio signal can be further stored in memory 104 or via
Communication component 116 is sent.In some embodiments, audio component 110 further includes a loud speaker, is used for exports audio signal.
I/O interfaces 112 provide interface between processing component 102 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor module 114 includes one or more sensors, the shape for providing various aspects for block chain node 100
State is assessed.For example, sensor module 114 can detect the state that opens/closes of block chain node 100, component it is relatively fixed
Position, such as the component are the display and keypad of block chain node 100, and sensor module 114 can also detect block chain
The position change of node 100 or block chain 100 1 components of node, the presence or do not deposit that user contacts with block chain node 100
In the temperature change of 100 orientation of block chain node or acceleration/deceleration and block chain node 100.Sensor module 114 can wrap
Proximity sensor is included, is configured to detect the presence of nearby objects without any physical contact.Sensor module 114
Can also include optical sensor, such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments,
The sensor module 114 can also include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature
Sensor.
Communication component 116 is configured to facilitate the logical of wired or wireless way between block chain node 100 and other equipment
Letter.Block chain node 100 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or combination thereof.
In one exemplary embodiment, communication component 116 receives the broadcast singal from external broadcasting management system via broadcast channel
Or broadcast related information.In one exemplary embodiment, the communication component 116 further includes near-field communication (NFC) module, with
Promote short range communication.For example, can be based on radio frequency identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology surpasses
Broadband (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, block chain node 100 can by one or more application application-specific integrated circuit (ASIC),
Digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field-programmable gate array
It arranges (FPGA), controller, microcontroller, microprocessor or other electronic components to realize, for executing above-mentioned mobile network's access
Authentication method.
In the exemplary embodiment, it includes the non-transitorycomputer readable storage medium instructed, example to additionally provide a kind of
Such as include the memory 104 of instruction, above-metioned instruction can be executed by the processor 120 of block chain node 100 to complete above-mentioned movement
Network access verifying method.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory
(RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, all answer by the change or replacement that can be readily occurred in
It is included within the scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (22)
1. a kind of mobile network's access authentication method, which is characterized in that the method is applied to certificate server, the certification clothes
Business device is the node in block chain network, the method includes:
The certification request that user equipment is sent is received, the certification request includes the first block chain address and identity information;
The block chain is inquired according to the first block chain address, determines whether the block chain stores and the identity information
The authentication information being consistent, wherein the support system of mobile network tests the identity of user equipment in user equipment registration
It demonstrate,proves in information write-in block chain, if being stored with the authentication information being consistent with the identity information, table in the block chain
The target UE that the bright identity information indicates is in mobile network register;
When being stored with the authentication information being consistent with the identity information in the block chain, based on identifying algorithm to described
User equipment is authenticated, wherein if certification success, shows that the user equipment is that the target that the identity information indicates is used
Family equipment.
2. according to the method described in claim 1, it is characterized in that, described recognize the user equipment based on identifying algorithm
Card, including:
Two-way authentication is carried out based on rivest, shamir, adelman and the user equipment.
3. according to the method described in claim 1, it is characterized in that, the authentication information include a public key, it is described to be based on
Identifying algorithm is authenticated the user equipment, including:
The first authentication challenge is sent to the user equipment, first authentication challenge includes the first random number;
The first authentication challenge response that the user equipment is sent is received, the first authentication challenge response includes the first A.L.S.
Breath, wherein first signing messages is that the first random number described in the private key signature of the user equipment obtains;
Signature verification is carried out to first signing messages according to first public key, wherein show if signature verification success
The user equipment is the target UE that the identity information indicates.
4. according to the method described in claim 1, it is characterized in that, the certification request further includes the second random number;
The method further includes:
It is signed to second random number according to the private key of the certificate server, obtains the second signing messages;
It will be rung including the second authentication challenge of second signing messages and the second block chain address of the certificate server
It should be sent to the user equipment, the second block chain address inquires public key for the user equipment from the block chain
Signature verification is carried out to second signing messages, wherein the public key of the certificate server is support system write-in institute
It states in block chain.
5. according to the described method of any one of claim 1-4, which is characterized in that the method further includes:
There is no the authentication information being consistent with the identity information of the user equipment or institutes in confirming the block chain
State the authentication information being consistent with the identity information of the user equipment stored in block chain it is invalid when, described in refusal respond
Certification request.
6. a kind of mobile network's access authentication method, which is characterized in that the method is applied to user equipment, the user equipment
It is the node in block chain network, the method includes:
Certification request is sent to certificate server, the certification request includes the first block chain address and identity information, described
First block chain address and the identity information confirm the target user that the identity information indicates for the certificate server
Whether equipment is in mobile network register;
Confirming target UE that the identity information indicates after the mobile network register, based on identifying algorithm with
The certificate server completes the authentication to the user equipment, wherein if certification success, shows the user equipment
The target UE indicated for the identity information.
7. according to the method described in claim 6, it is characterized in that, described completed based on identifying algorithm and the certificate server
Authentication to the user equipment, including:
The first authentication challenge that the certificate server is sent is received, first authentication challenge includes the first random number;
It is signed to first random number according to the private key of the user equipment, obtains the first signing messages;
It will be responded including the first authentication challenge of first signing messages and be sent to the certificate server, wherein described the
One signing messages is authenticated the user equipment for the certificate server.
8. the method according to the description of claim 7 is characterized in that the certification request further includes the second random number;
The method further includes:
The second authentication challenge response that the certificate server is sent is received, the second authentication challenge response includes the second signature
Second block chain address of information and the certificate server, wherein second signing messages is the certificate server
Private key signature described in second random number obtain;
The public key of the certificate server is inquired from the block chain according to the second block chain address and to described second
Signing messages carries out signature verification, wherein shows that the certificate server is legal if signature verification success.
9. according to the method described in any one of claim 6-8, which is characterized in that send certification to certificate server described
Before request, the method further includes:
Registration request is sent to the support system of mobile network, the registration request includes the authentication letter of the user equipment
Breath, wherein the support system is the node in block chain network;
The starter node information for the block chain that the support system is sent is received, the starter node information is used for the use
Family equipment is based on block chain agreement and accesses block chain network.
10. a kind of mobile network's access authentication device, which is characterized in that described device is applied to certificate server, the certification
Server is the node in block chain network, and described device includes:First receiving module, for receiving recognizing for user equipment transmission
Card request, the certification request include the first block chain address and identity information;Enquiry module, for according to firstth area
Block chain address inquires the block chain, determines whether the block chain stores the authentication letter being consistent with the identity information
Breath, wherein block chain is written in user equipment registration, by the authentication information of user equipment in the support system of mobile network
In, if being stored with the authentication information being consistent with the identity information in the block chain, show the identity information table
The target UE shown is in mobile network register;
First authentication module, when for being stored with the authentication information being consistent with the identity information in the block chain,
The user equipment is authenticated based on identifying algorithm, wherein if certification success, show that the user equipment is the body
The target UE that part information indicates.
11. device according to claim 10, which is characterized in that first authentication module includes:
First authentication sub module, for carrying out two-way authentication based on rivest, shamir, adelman and the user equipment.
12. device according to claim 10, which is characterized in that the authentication information includes the first public key, described
First authentication module includes:
First sending submodule, for sending the first authentication challenge to the user equipment, first authentication challenge includes the
One random number;
First receiving submodule, the first authentication challenge response sent for receiving the user equipment, first certification are chosen
War response includes the first signing messages, wherein first signing messages is first described in the private key signature of the user equipment
What random number obtained;
First signature verification submodule, for carrying out signature verification to first signing messages according to first public key,
In, show that the user equipment is the target UE that the identity information indicates if signature verification success.
13. device according to claim 10, which is characterized in that the certification request further includes the second random number;
Described device further includes:
First signature blocks obtain for signing to second random number according to the private key of the certificate server
Two signing messages;
First sending module, for that will include the second block chain address of second signing messages and the certificate server
The response of the second authentication challenge be sent to the user equipment, the second block chain address is for the user equipment from described
It inquires public key in block chain to verify second signing messages, wherein the public key of the certificate server is the branch
The system of holding is written in the block chain.
14. according to the device described in any one of claim 10-13, which is characterized in that described device further includes:
Refusal respond module, for there is no the bodies being consistent with the identity information of the user equipment in confirming the block chain
The authentication information being consistent with the identity information of the user equipment stored in part verification information or the block chain without
When effect, certification request described in refusal respond.
15. a kind of mobile network's access authentication device, which is characterized in that described device is applied to user equipment, and the user sets
Standby is the node in block chain network, and described device includes:
Second sending module, for sending certification request to certificate server, the certification request includes the first block chain address
And identity information, the first block chain address and the identity information confirm the identity letter for the certificate server
Whether the target UE indicated is ceased in mobile network register;
Second authentication module, for confirming the target UE of the identity information expression in the mobile network register
Afterwards, the authentication to the user equipment is completed based on identifying algorithm and the certificate server, wherein if certification success,
Then show that the user equipment is the target UE that the identity information indicates.
16. device according to claim 15, which is characterized in that second authentication module includes:
Second receiving submodule, the first authentication challenge sent for receiving the certificate server, first authentication challenge
Including the first random number;
First signature submodule obtains for signing to first random number according to the private key of the user equipment
One signing messages;
Second sending submodule, the first authentication challenge response for that will include first signing messages are sent to the certification
Server, wherein first signing messages is authenticated the user equipment for the certificate server.
17. device according to claim 16, which is characterized in that the certification request further includes the second random number;
Described device further includes:
Second receiving module, the second authentication challenge response sent for receiving the certificate server, second certification are chosen
War response includes the second block chain address of the second signing messages and the certificate server, wherein second A.L.S.
Breath is that the second random number described in the private key signature of the certificate server obtains;
First signature verification module, for inquiring the authentication service from the block chain according to the second block chain address
The public key of device simultaneously carries out signature verification to second signing messages, wherein shows the certification clothes if signature verification success
Business device is legal.
18. according to the device described in any one of claim 15-17, which is characterized in that described device further includes:
Third sending module, for sending registration request to the support system of mobile network, the registration request includes the use
The authentication information of family equipment, wherein the support system is the node in block chain network;
Second receiving module, the starter node information for receiving the block chain that the support system is sent, the startup
Nodal information is based on block chain agreement for the user equipment and accesses block chain network.
19. a kind of non-transitorycomputer readable storage medium, which is characterized in that the non-transitory computer-readable storage medium
Matter includes one or more programs, and one or more of programs require the side described in any one of 1-5 for perform claim
Method.
20. a kind of block chain node, which is characterized in that including:
Non-transitorycomputer readable storage medium described in claim 19;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
21. a kind of non-transitorycomputer readable storage medium, which is characterized in that the non-transitory computer-readable storage medium
Matter includes one or more programs, and one or more of programs require the side described in any one of 6-9 for perform claim
Method.
22. a kind of block chain node, which is characterized in that including:
Non-transitorycomputer readable storage medium described in claim 21;And
One or more processor, for executing the program in the non-transitorycomputer readable storage medium.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2017/114072 WO2019104690A1 (en) | 2017-11-30 | 2017-11-30 | Mobile network access authentication method, device, storage medium and block chain node |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108702622A true CN108702622A (en) | 2018-10-23 |
Family
ID=63844103
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780006171.7A Pending CN108702622A (en) | 2017-11-30 | 2017-11-30 | Mobile network's access authentication method, device, storage medium and block chain node |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108702622A (en) |
WO (1) | WO2019104690A1 (en) |
Cited By (49)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109168156A (en) * | 2018-11-01 | 2019-01-08 | 中国联合网络通信集团有限公司 | A kind of implementation method and server of virtual SIM card |
CN109492380A (en) * | 2019-01-11 | 2019-03-19 | 四川虹微技术有限公司 | A kind of equipment authentication method, device and block chain node |
CN109862006A (en) * | 2019-01-29 | 2019-06-07 | 济南浪潮高新科技投资发展有限公司 | A kind of block catenary system cut-in method, apparatus and system |
CN109886036A (en) * | 2019-01-02 | 2019-06-14 | 广州大学 | Domain name distributed authentication method, device and block chain network based on block chain |
CN109981680A (en) * | 2019-04-08 | 2019-07-05 | 上海人行道网络信息技术有限公司 | A kind of access control implementation method, device, computer equipment and storage medium |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN109981305A (en) * | 2019-03-19 | 2019-07-05 | 全链通有限公司 | Group communication method, equipment and computer readable storage medium |
CN109995791A (en) * | 2019-04-11 | 2019-07-09 | 清华大学 | A kind of data grant method and system |
CN110048843A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key transmission method, equipment and computer readable storage medium |
CN110048842A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key processing method, equipment and computer readable storage medium |
CN110138558A (en) * | 2019-05-30 | 2019-08-16 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
CN110176994A (en) * | 2019-05-30 | 2019-08-27 | 全链通有限公司 | Session cipher key distributing method, equipment and storage medium based on alliance's block chain |
CN110225011A (en) * | 2019-05-30 | 2019-09-10 | 全链通有限公司 | Authentication method, equipment and the computer readable storage medium of user node |
CN110351364A (en) * | 2019-07-12 | 2019-10-18 | 全链通有限公司 | Date storage method, equipment and computer readable storage medium |
CN110445627A (en) * | 2019-08-12 | 2019-11-12 | 腾讯科技(深圳)有限公司 | Group updating method, apparatus, computer equipment and computer storage medium |
CN110572819A (en) * | 2019-07-27 | 2019-12-13 | 中国人民解放军战略支援部队信息工程大学 | Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system |
CN110602150A (en) * | 2019-10-16 | 2019-12-20 | 山东超越数控电子股份有限公司 | Trusted authentication method between SDN nodes |
CN110599653A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN110611679A (en) * | 2019-09-25 | 2019-12-24 | 杭州港盛软件科技有限公司 | Data transmission method, device, equipment and system |
CN110661812A (en) * | 2019-10-10 | 2020-01-07 | 国网山东省电力公司信息通信公司 | Block chain-based cascade authentication system |
CN110730450A (en) * | 2019-10-18 | 2020-01-24 | 中国联合网络通信集团有限公司 | Mobile communication method and system |
CN111163466A (en) * | 2019-12-30 | 2020-05-15 | 全链通有限公司 | Method for 5G user terminal to access block chain, user terminal equipment and medium |
CN111224804A (en) * | 2018-11-26 | 2020-06-02 | 中国移动通信集团辽宁有限公司 | Internet of things equipment initialization method and device, Internet of things equipment and storage medium |
CN111294323A (en) * | 2018-12-10 | 2020-06-16 | 成都高新信息技术研究院 | Decentralized mobile subscriber identification method and system |
CN111385755A (en) * | 2020-03-18 | 2020-07-07 | 成都西加云杉科技有限公司 | Bandwidth resource sharing method, device, equipment and readable storage medium |
CN111405607A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Network switching method, equipment and block chain system |
CN111526154A (en) * | 2020-04-30 | 2020-08-11 | 余伟霞 | Service data sharing system based on block chain network |
CN111586686A (en) * | 2020-05-14 | 2020-08-25 | 中国联合网络通信集团有限公司 | Method and system for network access authentication |
CN111914230A (en) * | 2020-07-17 | 2020-11-10 | 中国联合网络通信集团有限公司 | Block chain-based identity authentication method, system, terminal device and storage medium |
CN111935075A (en) * | 2020-06-23 | 2020-11-13 | 浪潮云信息技术股份公司 | Block chain-based digital identity signing and issuing method, equipment and medium |
CN111970691A (en) * | 2020-08-28 | 2020-11-20 | 北京邮电大学 | Equipment authentication access method, device, equipment and computer readable storage medium |
CN112183781A (en) * | 2020-09-28 | 2021-01-05 | 日立楼宇技术(广州)有限公司 | Authentication method and device for elevator maintenance personnel, computer equipment and storage medium |
CN112291064A (en) * | 2020-10-10 | 2021-01-29 | 达闼机器人有限公司 | Authentication system, registration and authentication method, device, storage medium and electronic equipment |
CN112333131A (en) * | 2019-08-05 | 2021-02-05 | 北京京东振世信息技术有限公司 | Service providing method, block chain network service system and storage medium |
CN112506267A (en) * | 2020-12-01 | 2021-03-16 | 上海银基信息安全技术股份有限公司 | RTC calibration method, vehicle-mounted terminal, user side and storage medium |
WO2021174927A1 (en) * | 2020-03-03 | 2021-09-10 | 支付宝实验室(新加坡)有限公司 | Blockchain-based identity verification method and apparatus, device, and storage medium |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
CN113904774A (en) * | 2021-08-27 | 2022-01-07 | 重庆小雨点小额贷款有限公司 | Block chain address authentication method and device and computer equipment |
CN114024692A (en) * | 2020-07-15 | 2022-02-08 | 华为技术有限公司 | Signing method, device and system |
CN114040143A (en) * | 2021-11-15 | 2022-02-11 | 百视通网络电视技术发展有限责任公司 | Method, system and equipment for IPTV service management |
CN114124418A (en) * | 2020-08-27 | 2022-03-01 | 中国移动通信集团河南有限公司 | Data processing method, device and system based on block chain and electronic equipment |
CN114286342A (en) * | 2021-12-20 | 2022-04-05 | 中国电信股份有限公司 | Authentication method, system, electronic device, and computer-readable storage medium |
WO2022111016A1 (en) * | 2020-11-27 | 2022-06-02 | 达闼机器人股份有限公司 | Mobile network access system and method, and storage medium, and electronic device |
CN114697061A (en) * | 2020-12-29 | 2022-07-01 | 中国移动通信有限公司研究院 | Access control method and device, network side equipment, terminal and block link point |
CN115225428A (en) * | 2021-06-29 | 2022-10-21 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN115242418A (en) * | 2021-06-29 | 2022-10-25 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN115250192A (en) * | 2021-06-29 | 2022-10-28 | 达闼机器人股份有限公司 | Robot network authentication system and method |
CN115361390A (en) * | 2022-10-21 | 2022-11-18 | 中国信息通信研究院 | Method for joining a blockchain network, computer storage medium and electronic device |
CN112506267B (en) * | 2020-12-01 | 2024-04-19 | 上海银基信息安全技术股份有限公司 | RTC calibration method, vehicle-mounted terminal, user and storage medium |
Families Citing this family (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110347750B (en) * | 2019-06-28 | 2023-06-13 | 创新先进技术有限公司 | Block chain-based data processing method and device |
CN112446784A (en) * | 2019-09-03 | 2021-03-05 | 上海唯链信息科技有限公司 | Block chain transaction verification method and related device |
CN111132149B (en) * | 2019-12-30 | 2023-11-21 | 全链通有限公司 | Registration method of 5G user terminal, user terminal equipment and medium |
CN111225001B (en) * | 2020-03-12 | 2023-04-07 | 北京跨联元焕网络科技有限公司 | Block chain decentralized communication method, electronic equipment and system |
CN111461752A (en) * | 2020-04-04 | 2020-07-28 | 上海健康医学院 | Pelvic floor medical consumable verification method based on block chain and pelvic floor rehabilitation equipment |
CN111818087B (en) * | 2020-07-27 | 2023-01-24 | 深圳壹账通智能科技有限公司 | Block chain node access method, device, equipment and readable storage medium |
CN112162984A (en) * | 2020-09-28 | 2021-01-01 | 彩讯科技股份有限公司 | Real name authentication method, system, equipment and storage medium based on block chain |
CN112188494B (en) * | 2020-10-22 | 2023-06-27 | 中国联合网络通信集团有限公司 | Terminal access method and device based on block chain network and micro base station |
CN112822687B (en) * | 2020-12-31 | 2023-03-24 | 山西特信环宇信息技术有限公司 | Cone block chain mobile terminal authentication method |
CN114765551B (en) * | 2021-01-04 | 2023-10-27 | 中国移动通信有限公司研究院 | SDP access control method and device based on blockchain |
CN112968893B (en) * | 2021-02-20 | 2023-05-02 | 中国联合网络通信集团有限公司 | Access control method and device for terminal equipment |
CN113271294A (en) * | 2021-04-25 | 2021-08-17 | 深圳前海华兆新能源有限公司 | Edge computing gateway identity authentication method based on block chain technology |
CN114979193B (en) * | 2021-05-06 | 2023-07-21 | 中移互联网有限公司 | Data processing method and device of Internet of vehicles, electronic equipment and computer readable storage medium |
CN114710317A (en) * | 2022-03-02 | 2022-07-05 | 北京邮电大学 | Identity authentication method and device based on block chain and storage medium |
CN116644401B (en) * | 2023-07-21 | 2023-10-20 | 山东知临信息技术有限责任公司 | Identity verification method, device, equipment and medium based on blockchain technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357640A (en) * | 2016-09-18 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
CN107147489A (en) * | 2017-05-02 | 2017-09-08 | 南京理工大学 | Distributed access authentication management method in a kind of LEO satellite network |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10496989B2 (en) * | 2016-02-22 | 2019-12-03 | Bank Of America Corporation | System to enable contactless access to a transaction terminal using a process data network |
CN106453271B (en) * | 2016-09-21 | 2019-05-03 | 江苏通付盾科技有限公司 | Identity registration method and system, identity identifying method and system |
CN106533696B (en) * | 2016-11-18 | 2019-10-01 | 江苏通付盾科技有限公司 | Identity identifying method, certificate server and user terminal based on block chain |
-
2017
- 2017-11-30 CN CN201780006171.7A patent/CN108702622A/en active Pending
- 2017-11-30 WO PCT/CN2017/114072 patent/WO2019104690A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106357640A (en) * | 2016-09-18 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN107079037A (en) * | 2016-09-18 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Identity identifying method, device, node and system based on block chain |
CN107079036A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Registration and authorization method, apparatus and system |
CN107147489A (en) * | 2017-05-02 | 2017-09-08 | 南京理工大学 | Distributed access authentication management method in a kind of LEO satellite network |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
Non-Patent Citations (1)
Title |
---|
ROGER PIQUERAS JOVER 等: "dHSS-Distributed Peer-to-Peer implementation of the LTE HSS based on the Bitcoin/Namecoin architecture", 《2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC)》 * |
Cited By (77)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109168156B (en) * | 2018-11-01 | 2021-06-29 | 中国联合网络通信集团有限公司 | Method, system, medium, computer program product and server for implementing virtual SIM card |
CN109168156A (en) * | 2018-11-01 | 2019-01-08 | 中国联合网络通信集团有限公司 | A kind of implementation method and server of virtual SIM card |
CN111224804A (en) * | 2018-11-26 | 2020-06-02 | 中国移动通信集团辽宁有限公司 | Internet of things equipment initialization method and device, Internet of things equipment and storage medium |
CN111294323B (en) * | 2018-12-10 | 2022-01-18 | 成都高新信息技术研究院 | Decentralized mobile subscriber identification method and system |
CN111294323A (en) * | 2018-12-10 | 2020-06-16 | 成都高新信息技术研究院 | Decentralized mobile subscriber identification method and system |
CN111405607B (en) * | 2019-01-02 | 2023-05-09 | 中国移动通信有限公司研究院 | Network switching method, device and block chain system |
CN109886036A (en) * | 2019-01-02 | 2019-06-14 | 广州大学 | Domain name distributed authentication method, device and block chain network based on block chain |
CN111405607A (en) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | Network switching method, equipment and block chain system |
CN109492380A (en) * | 2019-01-11 | 2019-03-19 | 四川虹微技术有限公司 | A kind of equipment authentication method, device and block chain node |
CN109862006A (en) * | 2019-01-29 | 2019-06-07 | 济南浪潮高新科技投资发展有限公司 | A kind of block catenary system cut-in method, apparatus and system |
CN109981305A (en) * | 2019-03-19 | 2019-07-05 | 全链通有限公司 | Group communication method, equipment and computer readable storage medium |
CN109981675A (en) * | 2019-04-04 | 2019-07-05 | 西安电子科技大学 | A kind of identity information guard method of digital identification authentication and encryption attribute |
CN109981675B (en) * | 2019-04-04 | 2021-10-26 | 西安电子科技大学 | Identity information protection method for digital identity authentication and attribute encryption |
CN109981680A (en) * | 2019-04-08 | 2019-07-05 | 上海人行道网络信息技术有限公司 | A kind of access control implementation method, device, computer equipment and storage medium |
CN109981680B (en) * | 2019-04-08 | 2021-08-24 | 上海人行道网络信息技术有限公司 | Access control implementation method and device, computer equipment and storage medium |
CN109995791A (en) * | 2019-04-11 | 2019-07-09 | 清华大学 | A kind of data grant method and system |
CN110225011B (en) * | 2019-05-30 | 2021-07-13 | 全链通有限公司 | Authentication method and device for user node and computer readable storage medium |
CN110138558B (en) * | 2019-05-30 | 2021-09-10 | 全链通有限公司 | Transmission method and device of session key and computer-readable storage medium |
CN110048843B (en) * | 2019-05-30 | 2021-09-10 | 全链通有限公司 | Session key transmission method, device and computer readable storage medium |
CN110225011A (en) * | 2019-05-30 | 2019-09-10 | 全链通有限公司 | Authentication method, equipment and the computer readable storage medium of user node |
CN110048842B (en) * | 2019-05-30 | 2021-09-10 | 全链通有限公司 | Session key processing method, device and computer readable storage medium |
CN110176994A (en) * | 2019-05-30 | 2019-08-27 | 全链通有限公司 | Session cipher key distributing method, equipment and storage medium based on alliance's block chain |
CN110138558A (en) * | 2019-05-30 | 2019-08-16 | 全链通有限公司 | Transmission method, equipment and the computer readable storage medium of session key |
CN110048842A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key processing method, equipment and computer readable storage medium |
CN110048843A (en) * | 2019-05-30 | 2019-07-23 | 全链通有限公司 | Session key transmission method, equipment and computer readable storage medium |
CN110351364A (en) * | 2019-07-12 | 2019-10-18 | 全链通有限公司 | Date storage method, equipment and computer readable storage medium |
CN110572819A (en) * | 2019-07-27 | 2019-12-13 | 中国人民解放军战略支援部队信息工程大学 | Block chain-based multi-domain wireless Mesh network cross-domain authentication method and system |
CN112333131B (en) * | 2019-08-05 | 2023-04-18 | 北京京东振世信息技术有限公司 | Service providing method, block chain network service system and storage medium |
CN112333131A (en) * | 2019-08-05 | 2021-02-05 | 北京京东振世信息技术有限公司 | Service providing method, block chain network service system and storage medium |
CN110445627B (en) * | 2019-08-12 | 2021-10-26 | 腾讯科技(深圳)有限公司 | Group updating method and device, computer equipment and computer storage medium |
CN110445627A (en) * | 2019-08-12 | 2019-11-12 | 腾讯科技(深圳)有限公司 | Group updating method, apparatus, computer equipment and computer storage medium |
CN110599653B (en) * | 2019-09-11 | 2022-02-11 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN110599653A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN110611679A (en) * | 2019-09-25 | 2019-12-24 | 杭州港盛软件科技有限公司 | Data transmission method, device, equipment and system |
CN110661812A (en) * | 2019-10-10 | 2020-01-07 | 国网山东省电力公司信息通信公司 | Block chain-based cascade authentication system |
WO2021073147A1 (en) * | 2019-10-16 | 2021-04-22 | 山东超越数控电子股份有限公司 | Credibility authentication method for sdn nodes |
CN110602150A (en) * | 2019-10-16 | 2019-12-20 | 山东超越数控电子股份有限公司 | Trusted authentication method between SDN nodes |
CN110730450A (en) * | 2019-10-18 | 2020-01-24 | 中国联合网络通信集团有限公司 | Mobile communication method and system |
CN110730450B (en) * | 2019-10-18 | 2023-03-24 | 中国联合网络通信集团有限公司 | Mobile communication method and system |
CN111163466B (en) * | 2019-12-30 | 2022-12-16 | 全链通有限公司 | Method for 5G user terminal to access block chain, user terminal equipment and medium |
CN111163466A (en) * | 2019-12-30 | 2020-05-15 | 全链通有限公司 | Method for 5G user terminal to access block chain, user terminal equipment and medium |
WO2021174927A1 (en) * | 2020-03-03 | 2021-09-10 | 支付宝实验室(新加坡)有限公司 | Blockchain-based identity verification method and apparatus, device, and storage medium |
CN111385755A (en) * | 2020-03-18 | 2020-07-07 | 成都西加云杉科技有限公司 | Bandwidth resource sharing method, device, equipment and readable storage medium |
CN113572717A (en) * | 2020-04-29 | 2021-10-29 | 青岛海尔滚筒洗衣机有限公司 | Communication connection establishing method, washing and protecting equipment and server |
CN113572717B (en) * | 2020-04-29 | 2024-02-20 | 青岛海尔洗涤电器有限公司 | Communication connection establishment method, washing and protecting equipment and server |
CN111526154A (en) * | 2020-04-30 | 2020-08-11 | 余伟霞 | Service data sharing system based on block chain network |
CN111586686A (en) * | 2020-05-14 | 2020-08-25 | 中国联合网络通信集团有限公司 | Method and system for network access authentication |
CN111935075A (en) * | 2020-06-23 | 2020-11-13 | 浪潮云信息技术股份公司 | Block chain-based digital identity signing and issuing method, equipment and medium |
CN114024692A (en) * | 2020-07-15 | 2022-02-08 | 华为技术有限公司 | Signing method, device and system |
CN114024692B (en) * | 2020-07-15 | 2023-06-20 | 华为技术有限公司 | Signing method, device and system |
CN111914230A (en) * | 2020-07-17 | 2020-11-10 | 中国联合网络通信集团有限公司 | Block chain-based identity authentication method, system, terminal device and storage medium |
CN111914230B (en) * | 2020-07-17 | 2023-06-23 | 中国联合网络通信集团有限公司 | Identity verification method, system, terminal equipment and storage medium based on block chain |
CN114124418B (en) * | 2020-08-27 | 2023-11-21 | 中国移动通信集团河南有限公司 | Block chain-based data processing method, device and system and electronic equipment |
CN114124418A (en) * | 2020-08-27 | 2022-03-01 | 中国移动通信集团河南有限公司 | Data processing method, device and system based on block chain and electronic equipment |
CN111970691A (en) * | 2020-08-28 | 2020-11-20 | 北京邮电大学 | Equipment authentication access method, device, equipment and computer readable storage medium |
CN112183781A (en) * | 2020-09-28 | 2021-01-05 | 日立楼宇技术(广州)有限公司 | Authentication method and device for elevator maintenance personnel, computer equipment and storage medium |
WO2022073420A1 (en) * | 2020-10-10 | 2022-04-14 | 达闼机器人有限公司 | Authentication system, registration and authentication method, apparatus, storage medium, and electronic device |
CN112291064A (en) * | 2020-10-10 | 2021-01-29 | 达闼机器人有限公司 | Authentication system, registration and authentication method, device, storage medium and electronic equipment |
WO2022111016A1 (en) * | 2020-11-27 | 2022-06-02 | 达闼机器人股份有限公司 | Mobile network access system and method, and storage medium, and electronic device |
CN112506267B (en) * | 2020-12-01 | 2024-04-19 | 上海银基信息安全技术股份有限公司 | RTC calibration method, vehicle-mounted terminal, user and storage medium |
CN112506267A (en) * | 2020-12-01 | 2021-03-16 | 上海银基信息安全技术股份有限公司 | RTC calibration method, vehicle-mounted terminal, user side and storage medium |
WO2022143498A1 (en) * | 2020-12-29 | 2022-07-07 | 中国移动通信有限公司研究院 | Access control method and apparatus, and network-side device, terminal and blockchain node |
CN114697061A (en) * | 2020-12-29 | 2022-07-01 | 中国移动通信有限公司研究院 | Access control method and device, network side equipment, terminal and block link point |
CN115242418A (en) * | 2021-06-29 | 2022-10-25 | 达闼机器人股份有限公司 | Robot authentication system and method |
WO2023273277A1 (en) * | 2021-06-29 | 2023-01-05 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN115250192A (en) * | 2021-06-29 | 2022-10-28 | 达闼机器人股份有限公司 | Robot network authentication system and method |
WO2023273279A1 (en) * | 2021-06-29 | 2023-01-05 | 达闼机器人股份有限公司 | Network authentication system and method for robot |
WO2023273269A1 (en) * | 2021-06-29 | 2023-01-05 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN115225428A (en) * | 2021-06-29 | 2022-10-21 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN115225428B (en) * | 2021-06-29 | 2023-10-13 | 达闼机器人股份有限公司 | Robot authentication system and method |
CN113904774A (en) * | 2021-08-27 | 2022-01-07 | 重庆小雨点小额贷款有限公司 | Block chain address authentication method and device and computer equipment |
CN114040143A (en) * | 2021-11-15 | 2022-02-11 | 百视通网络电视技术发展有限责任公司 | Method, system and equipment for IPTV service management |
CN114040143B (en) * | 2021-11-15 | 2024-04-05 | 百视通网络电视技术发展有限责任公司 | Method, system and equipment for IPTV service management |
CN114286342A (en) * | 2021-12-20 | 2022-04-05 | 中国电信股份有限公司 | Authentication method, system, electronic device, and computer-readable storage medium |
CN114286342B (en) * | 2021-12-20 | 2024-01-02 | 中国电信股份有限公司 | Authentication method, authentication system, electronic device, and computer-readable storage medium |
WO2023115913A1 (en) * | 2021-12-20 | 2023-06-29 | 中国电信股份有限公司 | Authentication method and system, and electronic device and computer-readable storage medium |
CN115361390A (en) * | 2022-10-21 | 2022-11-18 | 中国信息通信研究院 | Method for joining a blockchain network, computer storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2019104690A1 (en) | 2019-06-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108702622A (en) | Mobile network's access authentication method, device, storage medium and block chain node | |
Braeken et al. | Novel 5G authentication protocol to improve the resistance against active attacks and malicious serving networks | |
CN104363631B (en) | The connection method of wireless router, device and system | |
Buttyan et al. | Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing | |
RU2549521C2 (en) | Indirect communication between devices | |
KR101793443B1 (en) | Method, apparatus, program and recording medium for setting smart device management account | |
WO2020103284A1 (en) | Smart card authentication method, smart lock, smart card, system and device | |
CN105357262B (en) | Apparatus control method and device | |
CN105007575B (en) | Method of calling and system | |
CN105744595B (en) | Access method, apparatus, system and the storage medium of WLAN | |
CN105282158A (en) | Intelligent equipment networking method, routing equipment, intelligent equipment and system | |
CN105491250B (en) | Recognition methods, device and the equipment of the incoming number true and false | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN104091376A (en) | Intelligent lock control method and apparatus thereof | |
CN107205208B (en) | Authentication method, terminal and server | |
CN109407528A (en) | Safety access method, device, server and storage medium | |
CN110049062A (en) | Verify code check method, device, electronic equipment and storage medium | |
CN106488450B (en) | Connect the method and device of wireless network | |
CN104980919B (en) | The acquisition methods and equipment of information of network service | |
CN105120452B (en) | Transmit the method, apparatus and system of information | |
CN104951678B (en) | Unlocking method and a device | |
CN104618987B (en) | Access the method and device of network | |
CN106062762A (en) | Application encryption method and device | |
CN105340353B (en) | Device-to-device communication security | |
CN108989142A (en) | Network test method, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181023 |
|
RJ01 | Rejection of invention patent application after publication |