CN110113735A - A kind of mobile network's safe encryption method based on near-field communication - Google Patents
A kind of mobile network's safe encryption method based on near-field communication Download PDFInfo
- Publication number
- CN110113735A CN110113735A CN201910309310.4A CN201910309310A CN110113735A CN 110113735 A CN110113735 A CN 110113735A CN 201910309310 A CN201910309310 A CN 201910309310A CN 110113735 A CN110113735 A CN 110113735A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- network
- access
- mobile terminal
- mobile network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/47—Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of mobile network's safe encryption method based on near-field communication, near-field communication is established by mobile terminal and smart machine, the mobile terminal initiates the connection request with mobile network service device and obtains dynamic authorization code, encrypted device parameter is forwarded to mobile network service device by smart machine, smart machine access to mobile network is realized by double verifying and the transmission security of intelligent data in a mobile network is realized by cipher mode, safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, guarantee the efficient and safe of data transmission simultaneously, user is not necessarily to many and diverse operation in access procedure, access way transparence, it not only ensure that user's personal information privacy and data transmission security, smart machine and mobile terminal hardware are protected simultaneously, it effectively prevent disliking Meaning attack.
Description
Technical field
The present invention relates to mobile network's safety, and in particular to a kind of mobile network's safety encryption side based on near-field communication
Method.
Background technique
As scientific and technological progress develops, the smart machine of people at one's side is more and more, these smart machines are in life and work
Side's aspect plays an important role, and needs to access network at any time and work, and is generally equipped on current smart machine
The networking module of internet is accessed, and provides a user the demand of better services based on internet.Current intelligent hardware devices
Major part can access internet by access wireless network or mobile network, wherein accessed and interconnected by wireless network
The approach of net, is suitable for the equipment such as smart home, these equipment typically be provided with comparison it is fixed use position, and those when
For often needing mobile and transformation to use the smart machine of position, need to access again if being detached from common wireless network, and
And network can not be then accessed in the area of not wireless network, it makes troubles to use.Current Conventional solutions are to allow this
A little equipment access to mobile network.And current mobile network needs when generally accessing access device to be used for user equipped with SIM card
Identification, is only mounted with the card, and mobile network could carry out verifying to the equipment to allow it that network is added and count
According to transmission and communication.But major part smart machine is limited to volume and design cost demand at present, generally will not be equipped with peace
The module of SIM card is filled, even if being equipped with the module, for the user, configures a SIM card for each smart machine,
Management and cost on for be all it is not humane, without be arranged SIM card smart machine in addition to passing through wireless network at present
The mode of access then can not access to mobile network.
It is protected in addition, the internet of mobile device access at present often lacks data transmission, it is general in data transmission procedure
Do not apply any processing, transmitted with plaintext version, easily generation leaking data and the possibility attacked.
It is in the prior art usually obtaining transmitting in the form of encryption data to transmission data increase ciphering process
Related data, and the typically no encrypting module or the cipher mode of outfit of being equipped with of current smart machine is also fixed, and
Cryptographic complexity is relatively low, it is easy to it can be cracked, it is excessively poor to malicious attack behavior protection effect.
Therefore, how ensure and to the greatest extent may be used with safety of the more safe and reliable scheme to access to mobile network
The safe transmission of the guarantee data of energy, is this field urgent problem to be solved.
Summary of the invention
For the safety problem of the smart machine of access to mobile network, the present invention provides a kind of shiftings based on near-field communication
Dynamic network security encryption method, includes the following steps:
Mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends smart machine to router and faces
When access request, router returns to interim access dynamic to the mobile terminal according to the access right of mobile terminal user
Authorization code simultaneously allows access request;
The mobile terminal obtains the device parameter of smart machine, the shifting by the two dimensional code on scanning smart machine
Dynamic terminal is established by NFC near-field communication and smart machine and is communicated to connect, and sends dynamic authorization code to the smart machine;
The smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is to open
When, start the network access security module in the smart machine, the network access security module is initial using the smart machine
Key and dynamic authorization code are encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and pass through near field
Communication is sent to mobile terminal using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
The mobile terminal logs in smart machine networking filing database, and inquires the intelligence of storage in the database
The device numbering list of equipment inquires the list to the device parameter that scanning obtains and obtains device numbering to be verified, judges institute
It states device numbering to be verified and whether is matched with the device numbering that the smart machine is sent, send out the smart machine if matching
The encryption data sent is forwarded to router;Otherwise, the interim access request with the router is disconnected;
The router receives the encryption data that the mobile terminal is sent, using the smart machine manufacturer described
The verification information and dynamic authorization code registered in mobile network service device are decoded encryption data, and verify the equipment
The data whether parameter and Customs Assigned Number pre-register, by allowing to notify to mobile terminal transmission access after verifying,
And the data after decryption are sent to mobile network service device;
Mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number accesses network parameter, and
Access network parameter is sent to the router, the router using the verification information of the registration included it is initial close
Key and dynamic authorization code are sent to the mobile terminal after encrypting to the access network parameter;
The mobile terminal, which receives network insertion, to be allowed notice and encrypted access network parameter and is transmitted to described
Smart machine, the smart machine recycles its encryption key and dynamic authorization code decodes the access network parameter and according to institute
It states access network parameter and carries out network configuration, access to mobile network automatically.
The network insertion status indicator is switched over by the virtual switch or physical switches being arranged on the smart machine,
It indicates that the smart machine is currently in network insertion open state when the switch is opened, net can not be accessed when the switch is closed
Network.
The data verifying the device parameter and Customs Assigned Number and whether pre-registering, including the following contents: it utilizes
The device parameter inquire the Customs Assigned Number corresponding with the device parameter registered in the router whether with send
Customs Assigned Number match, if mismatch, send network insertion refusal notice;Alternatively, being stepped on using Customs Assigned Number inquiry
Whether the device parameter corresponding with the Customs Assigned Number of note matches with the device parameter sent, if mismatching, sends net
Network admission reject notice.
The access network parameter includes following content: access point number, site frequency range and password.
The smart machine passes through access network parameter described in the baseband chip Auto-writing being arranged inside and realizes movement
The access function of network;The baseband chip data of required transmission are encoded according to the network protocol accessed after again into
The transmission of row data.
Method of the invention still further comprises, the smart machine according to access network parameter access to mobile network after then
Automatic disconnect connect with the near-field communication of the mobile terminal, and is directly counted using mobile network and mobile network service device
According to transmission, the smart machine is recorded according to the Customs Assigned Number of internal registration by the router during carrying out data transmission
The data content transmitted, so that the mobile terminal is inquired.
NFC near-field communication module is equipped in the smart machine.
It is additionally provided with SIM card module in the smart machine, directly can carry out mobile network using the SIM card of insertion and connect
Enter.
The device parameter includes the unique device identity and factory information of the smart machine.
Safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, while guarantee number
According to the efficient and safe of transmission, user is not necessarily to many and diverse operation in access procedure, and access way transparence, not only ensure that makes
User's personal information privacy and data transmission security, while smart machine and mobile terminal hardware are protected, it effectively prevent
Malicious attack.
Detailed description of the invention
Fig. 1 is mobile network's safe encryption method flow chart the present invention is based on near-field communication.
Specific embodiment
Fig. 1 is the stream of the invention for passing through mobile terminal safety access to mobile network using near-field communication realization smart machine
Cheng Tu, the method for the present invention specifically comprise the following steps:
Step 101, mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends intelligence to router
The energy interim access request of equipment, router return according to the access right of mobile terminal user to the mobile terminal interim
Access dynamic authorization code simultaneously allows access request;
Wherein mobile terminal may include connecting mobile network using SIM card using mobile phone, laptop etc. are existing
The mobile network that mobile terminal, the mobile terminal and Mobile Network Operator are signed guarantees the access of the mobile terminal using agreement
Legitimacy.Dynamic authorization code therein can take various forms generation, such as mobile network service device is using connecing at that time
The angle of incidence, user's coding, user's access point the dynamic datas such as number generate, to guarantee that provisional and uniqueness is anti-
Only in acquisition, the dynamic authorization code is illegally accessed third party.
Intelligent terminal then includes but is not limited to all kinds of mobile intelligent terminals below, such as washing machine, refrigerator, TV
The office equipment such as the household electrical appliance such as machine, air-conditioning or printer, projector or detecting instrument etc..
Step 102, by the two dimensional code on scanning smart machine, the device parameter for obtaining smart machine (is set mobile terminal
Standby parameter includes unique device identity and factory information of the smart machine etc.), mobile terminal passes through NFC near-field communication and intelligence
Energy equipment establishes communication connection, and sends dynamic authorization code to smart machine;NFC near-field communication module is equipped in smart machine.
NFC (near field communication technology) is a kind of non contact angle measurement interconnection technique, can be set in mobile device, PC and intelligence
Wireless near field communication is carried out between standby, belongs to non-contact radio-frequency identification technology RFID (Radio Frequency
IDentification development) allows electronic equipment to carry out contactless Point-to-Point Data Transmission mutually, and simultaneous downwards
Hold RFID technique.NFC has the characteristics that low in cost, easy-to-use and richer intuitive, by a chip, an antenna and
The combination of some softwares can be realized communication of the various equipment in several cm ranges.
Other barcode scanning forms can certainly be used to obtain device parameter, it is therefore intended that the convenience of user's acquisition device parameter
Property and the transparency, user require no knowledge about the design parameter content of the equipment.
Step 103, smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is
When unlatching, start the network access security module in the smart machine, network access security module is initial using the smart machine
Key and dynamic authorization code are encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and pass through near field
Communication is sent to mobile terminal using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
Wherein, network insertion status indicator is cut by the virtual switch or physical switches being arranged on the smart machine
It changes, indicates that smart machine is currently in network insertion open state when the switch is opened, network can not be accessed when the switch is closed;
Such as virtual touch key, capable of being opened by one key network insertion state can be set on touch screen smart machine;
Step 104, mobile terminal logs in smart machine networking filing database, and inquires the intelligence of storage in the database
The device numbering list of equipment obtains device numbering to be verified to the device parameter inquiry list that scanning obtains, judges to be verified
Whether device numbering matches with the device numbering that smart machine is sent, and the encryption data for sending smart machine if matching turns
It is sent to router;Otherwise, the interim access request with router is disconnected;
Smart machine networking filing database by be in mobile network service device registered SIM card mobile terminal user into
Row setting.The device numbering list can be registered from the mobile terminal user for buying the smart machine to mobile operator
Related data content is registered in smart machine networking filing database and is managed collectively by registration, mobile operator.
Step 105, router receives the encryption data that mobile terminal is sent, using smart machine manufacturer in mobile network
The verification information and dynamic authorization code registered in server are decoded encryption data, and verify device parameter and user
The data that whether pre-register of number allow to notify by sending access to mobile terminal after verifying, and by the data after decryption
It is sent to mobile network service device;
The data whether verifying device parameter and Customs Assigned Number pre-register, including the following contents: device parameter is utilized
Whether the Customs Assigned Number corresponding with device parameter registered in querying router matches with the Customs Assigned Number sent, if not
Matching sends network insertion refusal notice;Alternatively, being joined using the equipment corresponding with Customs Assigned Number that Customs Assigned Number inquiry is registered
Whether number matches with the device parameter sent, if mismatching, sends network insertion refusal notice.
Step 106, mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number access network ginseng
Number, and access network parameter is sent to router, initial key that router is included using the verification information of registration and
Dynamic authorization code docks after network parameter is encrypted and is sent to mobile terminal;Access network parameter includes following content: being connect
Access point number, site frequency range and password.
Step 107, mobile terminal receives network insertion and allows notice and encrypted access network parameter and be transmitted to
Smart machine, smart machine recycles its encryption key and dynamic authorization code decodes access network parameter and according to access network ginseng
Number is automatic to carry out network configuration, access to mobile network.
Smart machine passes through the baseband chip Auto-writing being arranged inside and accesses network parameter and realize connecing for mobile network
Enter function;Baseband chip carries out data transmission again after being encoded the data of required transmission according to the network protocol accessed.
Step 108, smart machine disconnects and mobile terminal according to then automatic after access network parameter access to mobile network
Near-field communication connection, and directly carried out data transmission using mobile network and mobile network service device, carry out data transmission process
In by router the data content that is transmitted of smart machine is recorded according to the Customs Assigned Number of internal registration, so as to mobile terminal into
Row inquiry.
Smart machine is in data transmission procedure subsequent, equally can be using its key and dynamic authorization code to data
Encrypted transmission is carried out, or directlys adopt plaintext transmission according to user's use demands.SIM card mould can also be set in smart machine
Block carries out mobile network's access so as to the SIM card directly using insertion.
The present invention passes through the mobile terminal of access to mobile network using near-field communication connection smart machine first, and by
Whether mobile terminal automated log on database inquiry facility number matches as authentication for the first time, and mobile terminal, which is sent, later adds
Ciphertext data is verified to router, and by carrying out second after router ciphertext data, by verify twice guarantee access device with
And the legitimacy of user, it can just be linked into mobile network.In the process, not only the data such as device parameter are encrypted, and
And dock and encrypted into network parameter, guarantee that the links information in access procedure is not attacked.In addition, in entire mistake
Cheng Zhong, user can be somebody's turn to do according to the smart machine connection assistant APP or the login direct real-time query of network address that operator provides
The information such as the connection status and connection history of smart machine, the networking dependency number for the smart machine for facilitating user to use oneself
According to being managed.
Safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, while guarantee number
According to the efficient and safe of transmission, user is not necessarily to many and diverse operation in access procedure, and access way transparence, not only ensure that makes
User's personal information privacy and data transmission security, while smart machine and mobile terminal hardware are protected, it effectively prevent
Malicious attack.
Above-mentioned technical proposal only embodies the optimal technical scheme of technical solution of the present invention, those skilled in the art
The principle of the present invention is embodied to some variations that some of them part may be made, belongs to the scope of protection of the present invention it
It is interior.
Claims (8)
1. a kind of mobile network's safe encryption method based on near-field communication, including mobile terminal, smart machine and mobile network
Server, it is characterised in that include the following steps:
Mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends smart machine to router and temporarily connects
Enter request, router returns to interim access dynamic authorization to the mobile terminal according to the access right of mobile terminal user
Code simultaneously allows access request;
The mobile terminal obtains the device parameter of smart machine by the two dimensional code on scanning smart machine, described mobile whole
End is established by NFC near-field communication and smart machine and is communicated to connect, and sends dynamic authorization code to the smart machine;
The smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is to open,
Start the network access security module in the smart machine, the network access security module uses the smart machine initial key
And dynamic authorization code is encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and passes through near-field communication
Mobile terminal is sent to using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
The mobile terminal logs in smart machine networking filing database, and inquires the smart machine of storage in the database
Device numbering list, the list is inquired to the device parameter that scanning obtains and obtains device numbering to be verified, judgement it is described to
Whether verifying device numbering matches with the device numbering that the smart machine is sent, and sends the smart machine if matching
Encryption data be forwarded to router;Otherwise, the interim access request with the router is disconnected;
The router receives the encryption data that the mobile terminal is sent, using the smart machine manufacturer in the movement
The verification information and dynamic authorization code registered in network server are decoded encryption data, and verify the device parameter
And the data whether Customs Assigned Number pre-registers, allow to notify by sending access to the mobile terminal after verifying, and will
Data after decryption are sent to mobile network service device;
Mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number accesses network parameter, and will connect
Enter network parameter and be sent to the router, the router using the initial key that the verification information of the registration is included with
And dynamic authorization code the access network parameter is encrypted after be sent to the mobile terminal;
The mobile terminal, which receives network insertion, to be allowed notice and encrypted access network parameter and is transmitted to the intelligence
Equipment, the smart machine recycles its encryption key and dynamic authorization code decodes the access network parameter and connect according to described
Enter network parameter and carries out network configuration, access to mobile network automatically.
2. mobile network's safe encryption method according to claim 1 based on near-field communication, it is characterised in that: the net
Network access state mark is switched over by the virtual switch or physical switches that are arranged on the smart machine, when the switch is opened table
Show that the smart machine is currently in network insertion open state, network can not be accessed when the switch is closed.
3. mobile network's safe encryption method according to claim 1 based on near-field communication, it is characterised in that: described to test
It demonstrate,proves the data whether device parameter and Customs Assigned Number pre-register, including the following contents: being looked into using the device parameter
Ask the Customs Assigned Number corresponding with the device parameter registered in the router whether with the Customs Assigned Number phase that sends
Match, if mismatching, sends network insertion refusal notice;Alternatively, being inquired using the Customs Assigned Number being registered with the user
It numbers whether corresponding device parameter matches with the device parameter sent, if mismatching, sends network insertion refusal notice.
4. mobile network's safe encryption method according to claim 2 or 3 based on near-field communication, it is characterised in that: institute
Stating access network parameter includes following content: access point number, site frequency range and password.
5. according to the described in any item mobile network's safe encryption methods based on near-field communication of claim 2-4, feature exists
Pass through access network parameter described in the baseband chip Auto-writing that is arranged inside in: the smart machine and realizes mobile network's
Access function;The baseband chip carries out data after being encoded the data of required transmission according to the network protocol accessed again
Transmission.
6. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: the intelligence
Can equipment according to then automatic disconnect connect with the near-field communication of the mobile terminal after access network parameter access to mobile network, and
Directly carried out data transmission using mobile network and mobile network service device, by the router during carrying out data transmission
The data content that the smart machine is transmitted is recorded according to the Customs Assigned Number of internal registration, so that the mobile terminal is looked into
It askes.
7. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: described to set
Standby parameter includes the unique device identity and factory information of the smart machine.
8. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: the intelligence
NFC near-field communication module can be equipped in equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910309310.4A CN110113735B (en) | 2019-04-17 | 2019-04-17 | Mobile network security encryption method based on near field communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910309310.4A CN110113735B (en) | 2019-04-17 | 2019-04-17 | Mobile network security encryption method based on near field communication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110113735A true CN110113735A (en) | 2019-08-09 |
CN110113735B CN110113735B (en) | 2023-03-24 |
Family
ID=67485684
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910309310.4A Active CN110113735B (en) | 2019-04-17 | 2019-04-17 | Mobile network security encryption method based on near field communication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110113735B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113423100A (en) * | 2021-06-23 | 2021-09-21 | 宁夏隆基宁光仪表股份有限公司 | NB instrument testing method, system and equipment based on AES encryption |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2955450A1 (en) * | 2010-01-21 | 2011-07-22 | Sfr Sa | METHOD OF AUTHENTICATING A MOBILE TERMINAL TO ACCESS A SERVER OF APPLICATIONS |
US20140036852A1 (en) * | 2011-05-27 | 2014-02-06 | Alcatel-Lucent | Method of communication under network condition converging cellular network and wlan |
CN105554687A (en) * | 2015-12-14 | 2016-05-04 | 小米科技有限责任公司 | Networking working method of intelligent equipment, device and intelligent equipment |
WO2017025006A1 (en) * | 2015-08-13 | 2017-02-16 | 腾讯科技(深圳)有限公司 | Wireless network logon method and apparatus |
CN107396359A (en) * | 2017-08-02 | 2017-11-24 | 歌尔股份有限公司 | A kind of method and apparatus for controlling access mobile data network |
WO2018090829A1 (en) * | 2016-11-15 | 2018-05-24 | 深圳市阿凡达智控有限公司 | Method and apparatus for allowing intelligent terminal device to access internet |
-
2019
- 2019-04-17 CN CN201910309310.4A patent/CN110113735B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2955450A1 (en) * | 2010-01-21 | 2011-07-22 | Sfr Sa | METHOD OF AUTHENTICATING A MOBILE TERMINAL TO ACCESS A SERVER OF APPLICATIONS |
US20140036852A1 (en) * | 2011-05-27 | 2014-02-06 | Alcatel-Lucent | Method of communication under network condition converging cellular network and wlan |
WO2017025006A1 (en) * | 2015-08-13 | 2017-02-16 | 腾讯科技(深圳)有限公司 | Wireless network logon method and apparatus |
CN105554687A (en) * | 2015-12-14 | 2016-05-04 | 小米科技有限责任公司 | Networking working method of intelligent equipment, device and intelligent equipment |
WO2018090829A1 (en) * | 2016-11-15 | 2018-05-24 | 深圳市阿凡达智控有限公司 | Method and apparatus for allowing intelligent terminal device to access internet |
CN107396359A (en) * | 2017-08-02 | 2017-11-24 | 歌尔股份有限公司 | A kind of method and apparatus for controlling access mobile data network |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113423100A (en) * | 2021-06-23 | 2021-09-21 | 宁夏隆基宁光仪表股份有限公司 | NB instrument testing method, system and equipment based on AES encryption |
CN113423100B (en) * | 2021-06-23 | 2024-03-29 | 宁夏新立电子有限公司 | AES encryption-based NB instrument inspection method, system and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110113735B (en) | 2023-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110121170A (en) | Mobile network's auth method based on encryption technology | |
EP3698535B1 (en) | Privacy preserving tag | |
US8893234B2 (en) | Method of securing access to a proximity communication module in a mobile terminal | |
CN101938520B (en) | Mobile terminal signature-based remote payment system and method | |
CN104167029B (en) | A kind of intelligent lock and its operating method | |
CN110324287A (en) | Access authentication method, device and server | |
CN110062382B (en) | Identity verification method, client, relay equipment and server | |
US20050188219A1 (en) | Method and a system for communication between a terminal and at least one communication equipment | |
US20130257589A1 (en) | Access control using an electronic lock employing short range communication with mobile device | |
CN105847247A (en) | Authentication system and working method thereof | |
CN110995710B (en) | Smart home authentication method based on eUICC | |
CN101656960A (en) | Point-to-point communication method based on near field communication and near field communication device | |
CN101521886A (en) | Method and device for authenticating terminal and telecommunication smart card | |
EP2647172A1 (en) | Method for accessing a secure element and corresponding secure element and system | |
CN106790080A (en) | Secure communication of network method and apparatus between operation system and electronic certificate system | |
EP2530631A1 (en) | A method for accessing at least one service, corresponding communicating device and system | |
CN106790078A (en) | Safety communicating method and device between a kind of SDK and electronic certificate system | |
CN110113735A (en) | A kind of mobile network's safe encryption method based on near-field communication | |
KR20170070379A (en) | cryptograpic communication method and system based on USIM card of mobile device | |
WO2008145199A1 (en) | Method for the duplication of electronic-code keys | |
CN209070615U (en) | Electronics unlocking system | |
CN115171245B (en) | Door lock security authentication method and system based on HCE | |
CN102098391A (en) | Communication terminal and communication information processing method thereof | |
CN115277797A (en) | Remote control method for automatic meal selling device | |
CN106789013A (en) | Mutual trust and encipher-decipher method and device between a kind of door lock encryption chip and SDK |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |