CN110113735A - A kind of mobile network's safe encryption method based on near-field communication - Google Patents

A kind of mobile network's safe encryption method based on near-field communication Download PDF

Info

Publication number
CN110113735A
CN110113735A CN201910309310.4A CN201910309310A CN110113735A CN 110113735 A CN110113735 A CN 110113735A CN 201910309310 A CN201910309310 A CN 201910309310A CN 110113735 A CN110113735 A CN 110113735A
Authority
CN
China
Prior art keywords
smart machine
network
access
mobile terminal
mobile network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910309310.4A
Other languages
Chinese (zh)
Other versions
CN110113735B (en
Inventor
郑杰生
温柏坚
刘文彬
沈伍强
林细君
吴广财
陈守明
王建永
高尚
佟忠正
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Guangdong Power Grid Co Ltd
Original Assignee
Information Center of Guangdong Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Guangdong Power Grid Co Ltd filed Critical Information Center of Guangdong Power Grid Co Ltd
Priority to CN201910309310.4A priority Critical patent/CN110113735B/en
Publication of CN110113735A publication Critical patent/CN110113735A/en
Application granted granted Critical
Publication of CN110113735B publication Critical patent/CN110113735B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a kind of mobile network's safe encryption method based on near-field communication, near-field communication is established by mobile terminal and smart machine, the mobile terminal initiates the connection request with mobile network service device and obtains dynamic authorization code, encrypted device parameter is forwarded to mobile network service device by smart machine, smart machine access to mobile network is realized by double verifying and the transmission security of intelligent data in a mobile network is realized by cipher mode, safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, guarantee the efficient and safe of data transmission simultaneously, user is not necessarily to many and diverse operation in access procedure, access way transparence, it not only ensure that user's personal information privacy and data transmission security, smart machine and mobile terminal hardware are protected simultaneously, it effectively prevent disliking Meaning attack.

Description

A kind of mobile network's safe encryption method based on near-field communication
Technical field
The present invention relates to mobile network's safety, and in particular to a kind of mobile network's safety encryption side based on near-field communication Method.
Background technique
As scientific and technological progress develops, the smart machine of people at one's side is more and more, these smart machines are in life and work Side's aspect plays an important role, and needs to access network at any time and work, and is generally equipped on current smart machine The networking module of internet is accessed, and provides a user the demand of better services based on internet.Current intelligent hardware devices Major part can access internet by access wireless network or mobile network, wherein accessed and interconnected by wireless network The approach of net, is suitable for the equipment such as smart home, these equipment typically be provided with comparison it is fixed use position, and those when For often needing mobile and transformation to use the smart machine of position, need to access again if being detached from common wireless network, and And network can not be then accessed in the area of not wireless network, it makes troubles to use.Current Conventional solutions are to allow this A little equipment access to mobile network.And current mobile network needs when generally accessing access device to be used for user equipped with SIM card Identification, is only mounted with the card, and mobile network could carry out verifying to the equipment to allow it that network is added and count According to transmission and communication.But major part smart machine is limited to volume and design cost demand at present, generally will not be equipped with peace The module of SIM card is filled, even if being equipped with the module, for the user, configures a SIM card for each smart machine, Management and cost on for be all it is not humane, without be arranged SIM card smart machine in addition to passing through wireless network at present The mode of access then can not access to mobile network.
It is protected in addition, the internet of mobile device access at present often lacks data transmission, it is general in data transmission procedure Do not apply any processing, transmitted with plaintext version, easily generation leaking data and the possibility attacked.
It is in the prior art usually obtaining transmitting in the form of encryption data to transmission data increase ciphering process Related data, and the typically no encrypting module or the cipher mode of outfit of being equipped with of current smart machine is also fixed, and Cryptographic complexity is relatively low, it is easy to it can be cracked, it is excessively poor to malicious attack behavior protection effect.
Therefore, how ensure and to the greatest extent may be used with safety of the more safe and reliable scheme to access to mobile network The safe transmission of the guarantee data of energy, is this field urgent problem to be solved.
Summary of the invention
For the safety problem of the smart machine of access to mobile network, the present invention provides a kind of shiftings based on near-field communication Dynamic network security encryption method, includes the following steps:
Mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends smart machine to router and faces When access request, router returns to interim access dynamic to the mobile terminal according to the access right of mobile terminal user Authorization code simultaneously allows access request;
The mobile terminal obtains the device parameter of smart machine, the shifting by the two dimensional code on scanning smart machine Dynamic terminal is established by NFC near-field communication and smart machine and is communicated to connect, and sends dynamic authorization code to the smart machine;
The smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is to open When, start the network access security module in the smart machine, the network access security module is initial using the smart machine Key and dynamic authorization code are encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and pass through near field Communication is sent to mobile terminal using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
The mobile terminal logs in smart machine networking filing database, and inquires the intelligence of storage in the database The device numbering list of equipment inquires the list to the device parameter that scanning obtains and obtains device numbering to be verified, judges institute It states device numbering to be verified and whether is matched with the device numbering that the smart machine is sent, send out the smart machine if matching The encryption data sent is forwarded to router;Otherwise, the interim access request with the router is disconnected;
The router receives the encryption data that the mobile terminal is sent, using the smart machine manufacturer described The verification information and dynamic authorization code registered in mobile network service device are decoded encryption data, and verify the equipment The data whether parameter and Customs Assigned Number pre-register, by allowing to notify to mobile terminal transmission access after verifying, And the data after decryption are sent to mobile network service device;
Mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number accesses network parameter, and Access network parameter is sent to the router, the router using the verification information of the registration included it is initial close Key and dynamic authorization code are sent to the mobile terminal after encrypting to the access network parameter;
The mobile terminal, which receives network insertion, to be allowed notice and encrypted access network parameter and is transmitted to described Smart machine, the smart machine recycles its encryption key and dynamic authorization code decodes the access network parameter and according to institute It states access network parameter and carries out network configuration, access to mobile network automatically.
The network insertion status indicator is switched over by the virtual switch or physical switches being arranged on the smart machine, It indicates that the smart machine is currently in network insertion open state when the switch is opened, net can not be accessed when the switch is closed Network.
The data verifying the device parameter and Customs Assigned Number and whether pre-registering, including the following contents: it utilizes The device parameter inquire the Customs Assigned Number corresponding with the device parameter registered in the router whether with send Customs Assigned Number match, if mismatch, send network insertion refusal notice;Alternatively, being stepped on using Customs Assigned Number inquiry Whether the device parameter corresponding with the Customs Assigned Number of note matches with the device parameter sent, if mismatching, sends net Network admission reject notice.
The access network parameter includes following content: access point number, site frequency range and password.
The smart machine passes through access network parameter described in the baseband chip Auto-writing being arranged inside and realizes movement The access function of network;The baseband chip data of required transmission are encoded according to the network protocol accessed after again into The transmission of row data.
Method of the invention still further comprises, the smart machine according to access network parameter access to mobile network after then Automatic disconnect connect with the near-field communication of the mobile terminal, and is directly counted using mobile network and mobile network service device According to transmission, the smart machine is recorded according to the Customs Assigned Number of internal registration by the router during carrying out data transmission The data content transmitted, so that the mobile terminal is inquired.
NFC near-field communication module is equipped in the smart machine.
It is additionally provided with SIM card module in the smart machine, directly can carry out mobile network using the SIM card of insertion and connect Enter.
The device parameter includes the unique device identity and factory information of the smart machine.
Safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, while guarantee number According to the efficient and safe of transmission, user is not necessarily to many and diverse operation in access procedure, and access way transparence, not only ensure that makes User's personal information privacy and data transmission security, while smart machine and mobile terminal hardware are protected, it effectively prevent Malicious attack.
Detailed description of the invention
Fig. 1 is mobile network's safe encryption method flow chart the present invention is based on near-field communication.
Specific embodiment
Fig. 1 is the stream of the invention for passing through mobile terminal safety access to mobile network using near-field communication realization smart machine Cheng Tu, the method for the present invention specifically comprise the following steps:
Step 101, mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends intelligence to router The energy interim access request of equipment, router return according to the access right of mobile terminal user to the mobile terminal interim Access dynamic authorization code simultaneously allows access request;
Wherein mobile terminal may include connecting mobile network using SIM card using mobile phone, laptop etc. are existing The mobile network that mobile terminal, the mobile terminal and Mobile Network Operator are signed guarantees the access of the mobile terminal using agreement Legitimacy.Dynamic authorization code therein can take various forms generation, such as mobile network service device is using connecing at that time The angle of incidence, user's coding, user's access point the dynamic datas such as number generate, to guarantee that provisional and uniqueness is anti- Only in acquisition, the dynamic authorization code is illegally accessed third party.
Intelligent terminal then includes but is not limited to all kinds of mobile intelligent terminals below, such as washing machine, refrigerator, TV The office equipment such as the household electrical appliance such as machine, air-conditioning or printer, projector or detecting instrument etc..
Step 102, by the two dimensional code on scanning smart machine, the device parameter for obtaining smart machine (is set mobile terminal Standby parameter includes unique device identity and factory information of the smart machine etc.), mobile terminal passes through NFC near-field communication and intelligence Energy equipment establishes communication connection, and sends dynamic authorization code to smart machine;NFC near-field communication module is equipped in smart machine.
NFC (near field communication technology) is a kind of non contact angle measurement interconnection technique, can be set in mobile device, PC and intelligence Wireless near field communication is carried out between standby, belongs to non-contact radio-frequency identification technology RFID (Radio Frequency IDentification development) allows electronic equipment to carry out contactless Point-to-Point Data Transmission mutually, and simultaneous downwards Hold RFID technique.NFC has the characteristics that low in cost, easy-to-use and richer intuitive, by a chip, an antenna and The combination of some softwares can be realized communication of the various equipment in several cm ranges.
Other barcode scanning forms can certainly be used to obtain device parameter, it is therefore intended that the convenience of user's acquisition device parameter Property and the transparency, user require no knowledge about the design parameter content of the equipment.
Step 103, smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is When unlatching, start the network access security module in the smart machine, network access security module is initial using the smart machine Key and dynamic authorization code are encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and pass through near field Communication is sent to mobile terminal using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
Wherein, network insertion status indicator is cut by the virtual switch or physical switches being arranged on the smart machine It changes, indicates that smart machine is currently in network insertion open state when the switch is opened, network can not be accessed when the switch is closed; Such as virtual touch key, capable of being opened by one key network insertion state can be set on touch screen smart machine;
Step 104, mobile terminal logs in smart machine networking filing database, and inquires the intelligence of storage in the database The device numbering list of equipment obtains device numbering to be verified to the device parameter inquiry list that scanning obtains, judges to be verified Whether device numbering matches with the device numbering that smart machine is sent, and the encryption data for sending smart machine if matching turns It is sent to router;Otherwise, the interim access request with router is disconnected;
Smart machine networking filing database by be in mobile network service device registered SIM card mobile terminal user into Row setting.The device numbering list can be registered from the mobile terminal user for buying the smart machine to mobile operator Related data content is registered in smart machine networking filing database and is managed collectively by registration, mobile operator.
Step 105, router receives the encryption data that mobile terminal is sent, using smart machine manufacturer in mobile network The verification information and dynamic authorization code registered in server are decoded encryption data, and verify device parameter and user The data that whether pre-register of number allow to notify by sending access to mobile terminal after verifying, and by the data after decryption It is sent to mobile network service device;
The data whether verifying device parameter and Customs Assigned Number pre-register, including the following contents: device parameter is utilized Whether the Customs Assigned Number corresponding with device parameter registered in querying router matches with the Customs Assigned Number sent, if not Matching sends network insertion refusal notice;Alternatively, being joined using the equipment corresponding with Customs Assigned Number that Customs Assigned Number inquiry is registered Whether number matches with the device parameter sent, if mismatching, sends network insertion refusal notice.
Step 106, mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number access network ginseng Number, and access network parameter is sent to router, initial key that router is included using the verification information of registration and Dynamic authorization code docks after network parameter is encrypted and is sent to mobile terminal;Access network parameter includes following content: being connect Access point number, site frequency range and password.
Step 107, mobile terminal receives network insertion and allows notice and encrypted access network parameter and be transmitted to Smart machine, smart machine recycles its encryption key and dynamic authorization code decodes access network parameter and according to access network ginseng Number is automatic to carry out network configuration, access to mobile network.
Smart machine passes through the baseband chip Auto-writing being arranged inside and accesses network parameter and realize connecing for mobile network Enter function;Baseband chip carries out data transmission again after being encoded the data of required transmission according to the network protocol accessed.
Step 108, smart machine disconnects and mobile terminal according to then automatic after access network parameter access to mobile network Near-field communication connection, and directly carried out data transmission using mobile network and mobile network service device, carry out data transmission process In by router the data content that is transmitted of smart machine is recorded according to the Customs Assigned Number of internal registration, so as to mobile terminal into Row inquiry.
Smart machine is in data transmission procedure subsequent, equally can be using its key and dynamic authorization code to data Encrypted transmission is carried out, or directlys adopt plaintext transmission according to user's use demands.SIM card mould can also be set in smart machine Block carries out mobile network's access so as to the SIM card directly using insertion.
The present invention passes through the mobile terminal of access to mobile network using near-field communication connection smart machine first, and by Whether mobile terminal automated log on database inquiry facility number matches as authentication for the first time, and mobile terminal, which is sent, later adds Ciphertext data is verified to router, and by carrying out second after router ciphertext data, by verify twice guarantee access device with And the legitimacy of user, it can just be linked into mobile network.In the process, not only the data such as device parameter are encrypted, and And dock and encrypted into network parameter, guarantee that the links information in access procedure is not attacked.In addition, in entire mistake Cheng Zhong, user can be somebody's turn to do according to the smart machine connection assistant APP or the login direct real-time query of network address that operator provides The information such as the connection status and connection history of smart machine, the networking dependency number for the smart machine for facilitating user to use oneself According to being managed.
Safe encryption method of the invention can be realized the convenient and efficient addition mobile network of smart machine, while guarantee number According to the efficient and safe of transmission, user is not necessarily to many and diverse operation in access procedure, and access way transparence, not only ensure that makes User's personal information privacy and data transmission security, while smart machine and mobile terminal hardware are protected, it effectively prevent Malicious attack.
Above-mentioned technical proposal only embodies the optimal technical scheme of technical solution of the present invention, those skilled in the art The principle of the present invention is embodied to some variations that some of them part may be made, belongs to the scope of protection of the present invention it It is interior.

Claims (8)

1. a kind of mobile network's safe encryption method based on near-field communication, including mobile terminal, smart machine and mobile network Server, it is characterised in that include the following steps:
Mobile terminal configuration SIM card is used for access to mobile network, and the mobile terminal sends smart machine to router and temporarily connects Enter request, router returns to interim access dynamic authorization to the mobile terminal according to the access right of mobile terminal user Code simultaneously allows access request;
The mobile terminal obtains the device parameter of smart machine by the two dimensional code on scanning smart machine, described mobile whole End is established by NFC near-field communication and smart machine and is communicated to connect, and sends dynamic authorization code to the smart machine;
The smart machine identifies the network insertion status indicator of the smart machine itself, when network insertion state is to open, Start the network access security module in the smart machine, the network access security module uses the smart machine initial key And dynamic authorization code is encrypted to device parameter and with the Customs Assigned Number of smart machine binding, and passes through near-field communication Mobile terminal is sent to using device numbering and encrypted device parameter and Customs Assigned Number as encryption data;
The mobile terminal logs in smart machine networking filing database, and inquires the smart machine of storage in the database Device numbering list, the list is inquired to the device parameter that scanning obtains and obtains device numbering to be verified, judgement it is described to Whether verifying device numbering matches with the device numbering that the smart machine is sent, and sends the smart machine if matching Encryption data be forwarded to router;Otherwise, the interim access request with the router is disconnected;
The router receives the encryption data that the mobile terminal is sent, using the smart machine manufacturer in the movement The verification information and dynamic authorization code registered in network server are decoded encryption data, and verify the device parameter And the data whether Customs Assigned Number pre-registers, allow to notify by sending access to the mobile terminal after verifying, and will Data after decryption are sent to mobile network service device;
Mobile network service device Web vector graphic priority assignation according to corresponding to Customs Assigned Number accesses network parameter, and will connect Enter network parameter and be sent to the router, the router using the initial key that the verification information of the registration is included with And dynamic authorization code the access network parameter is encrypted after be sent to the mobile terminal;
The mobile terminal, which receives network insertion, to be allowed notice and encrypted access network parameter and is transmitted to the intelligence Equipment, the smart machine recycles its encryption key and dynamic authorization code decodes the access network parameter and connect according to described Enter network parameter and carries out network configuration, access to mobile network automatically.
2. mobile network's safe encryption method according to claim 1 based on near-field communication, it is characterised in that: the net Network access state mark is switched over by the virtual switch or physical switches that are arranged on the smart machine, when the switch is opened table Show that the smart machine is currently in network insertion open state, network can not be accessed when the switch is closed.
3. mobile network's safe encryption method according to claim 1 based on near-field communication, it is characterised in that: described to test It demonstrate,proves the data whether device parameter and Customs Assigned Number pre-register, including the following contents: being looked into using the device parameter Ask the Customs Assigned Number corresponding with the device parameter registered in the router whether with the Customs Assigned Number phase that sends Match, if mismatching, sends network insertion refusal notice;Alternatively, being inquired using the Customs Assigned Number being registered with the user It numbers whether corresponding device parameter matches with the device parameter sent, if mismatching, sends network insertion refusal notice.
4. mobile network's safe encryption method according to claim 2 or 3 based on near-field communication, it is characterised in that: institute Stating access network parameter includes following content: access point number, site frequency range and password.
5. according to the described in any item mobile network's safe encryption methods based on near-field communication of claim 2-4, feature exists Pass through access network parameter described in the baseband chip Auto-writing that is arranged inside in: the smart machine and realizes mobile network's Access function;The baseband chip carries out data after being encoded the data of required transmission according to the network protocol accessed again Transmission.
6. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: the intelligence Can equipment according to then automatic disconnect connect with the near-field communication of the mobile terminal after access network parameter access to mobile network, and Directly carried out data transmission using mobile network and mobile network service device, by the router during carrying out data transmission The data content that the smart machine is transmitted is recorded according to the Customs Assigned Number of internal registration, so that the mobile terminal is looked into It askes.
7. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: described to set Standby parameter includes the unique device identity and factory information of the smart machine.
8. mobile network's safe encryption method according to claim 5 based on near-field communication, it is characterised in that: the intelligence NFC near-field communication module can be equipped in equipment.
CN201910309310.4A 2019-04-17 2019-04-17 Mobile network security encryption method based on near field communication Active CN110113735B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910309310.4A CN110113735B (en) 2019-04-17 2019-04-17 Mobile network security encryption method based on near field communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910309310.4A CN110113735B (en) 2019-04-17 2019-04-17 Mobile network security encryption method based on near field communication

Publications (2)

Publication Number Publication Date
CN110113735A true CN110113735A (en) 2019-08-09
CN110113735B CN110113735B (en) 2023-03-24

Family

ID=67485684

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910309310.4A Active CN110113735B (en) 2019-04-17 2019-04-17 Mobile network security encryption method based on near field communication

Country Status (1)

Country Link
CN (1) CN110113735B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113423100A (en) * 2021-06-23 2021-09-21 宁夏隆基宁光仪表股份有限公司 NB instrument testing method, system and equipment based on AES encryption

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2955450A1 (en) * 2010-01-21 2011-07-22 Sfr Sa METHOD OF AUTHENTICATING A MOBILE TERMINAL TO ACCESS A SERVER OF APPLICATIONS
US20140036852A1 (en) * 2011-05-27 2014-02-06 Alcatel-Lucent Method of communication under network condition converging cellular network and wlan
CN105554687A (en) * 2015-12-14 2016-05-04 小米科技有限责任公司 Networking working method of intelligent equipment, device and intelligent equipment
WO2017025006A1 (en) * 2015-08-13 2017-02-16 腾讯科技(深圳)有限公司 Wireless network logon method and apparatus
CN107396359A (en) * 2017-08-02 2017-11-24 歌尔股份有限公司 A kind of method and apparatus for controlling access mobile data network
WO2018090829A1 (en) * 2016-11-15 2018-05-24 深圳市阿凡达智控有限公司 Method and apparatus for allowing intelligent terminal device to access internet

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2955450A1 (en) * 2010-01-21 2011-07-22 Sfr Sa METHOD OF AUTHENTICATING A MOBILE TERMINAL TO ACCESS A SERVER OF APPLICATIONS
US20140036852A1 (en) * 2011-05-27 2014-02-06 Alcatel-Lucent Method of communication under network condition converging cellular network and wlan
WO2017025006A1 (en) * 2015-08-13 2017-02-16 腾讯科技(深圳)有限公司 Wireless network logon method and apparatus
CN105554687A (en) * 2015-12-14 2016-05-04 小米科技有限责任公司 Networking working method of intelligent equipment, device and intelligent equipment
WO2018090829A1 (en) * 2016-11-15 2018-05-24 深圳市阿凡达智控有限公司 Method and apparatus for allowing intelligent terminal device to access internet
CN107396359A (en) * 2017-08-02 2017-11-24 歌尔股份有限公司 A kind of method and apparatus for controlling access mobile data network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113423100A (en) * 2021-06-23 2021-09-21 宁夏隆基宁光仪表股份有限公司 NB instrument testing method, system and equipment based on AES encryption
CN113423100B (en) * 2021-06-23 2024-03-29 宁夏新立电子有限公司 AES encryption-based NB instrument inspection method, system and equipment

Also Published As

Publication number Publication date
CN110113735B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN110121170A (en) Mobile network's auth method based on encryption technology
EP3698535B1 (en) Privacy preserving tag
US8893234B2 (en) Method of securing access to a proximity communication module in a mobile terminal
CN101938520B (en) Mobile terminal signature-based remote payment system and method
CN104167029B (en) A kind of intelligent lock and its operating method
CN110324287A (en) Access authentication method, device and server
CN110062382B (en) Identity verification method, client, relay equipment and server
US20050188219A1 (en) Method and a system for communication between a terminal and at least one communication equipment
US20130257589A1 (en) Access control using an electronic lock employing short range communication with mobile device
CN105847247A (en) Authentication system and working method thereof
CN110995710B (en) Smart home authentication method based on eUICC
CN101656960A (en) Point-to-point communication method based on near field communication and near field communication device
CN101521886A (en) Method and device for authenticating terminal and telecommunication smart card
EP2647172A1 (en) Method for accessing a secure element and corresponding secure element and system
CN106790080A (en) Secure communication of network method and apparatus between operation system and electronic certificate system
EP2530631A1 (en) A method for accessing at least one service, corresponding communicating device and system
CN106790078A (en) Safety communicating method and device between a kind of SDK and electronic certificate system
CN110113735A (en) A kind of mobile network's safe encryption method based on near-field communication
KR20170070379A (en) cryptograpic communication method and system based on USIM card of mobile device
WO2008145199A1 (en) Method for the duplication of electronic-code keys
CN209070615U (en) Electronics unlocking system
CN115171245B (en) Door lock security authentication method and system based on HCE
CN102098391A (en) Communication terminal and communication information processing method thereof
CN115277797A (en) Remote control method for automatic meal selling device
CN106789013A (en) Mutual trust and encipher-decipher method and device between a kind of door lock encryption chip and SDK

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant