CN110138736B - Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things - Google Patents

Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things Download PDF

Info

Publication number
CN110138736B
CN110138736B CN201910289318.9A CN201910289318A CN110138736B CN 110138736 B CN110138736 B CN 110138736B CN 201910289318 A CN201910289318 A CN 201910289318A CN 110138736 B CN110138736 B CN 110138736B
Authority
CN
China
Prior art keywords
identity authentication
user equipment
internet
things
dynamic random
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910289318.9A
Other languages
Chinese (zh)
Other versions
CN110138736A (en
Inventor
陈庆顺
廖珮君
黄艺香
刘庚水
李雪锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quanzhou Institute of Information Engineering
Original Assignee
Quanzhou Institute of Information Engineering
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Quanzhou Institute of Information Engineering filed Critical Quanzhou Institute of Information Engineering
Priority to CN201910289318.9A priority Critical patent/CN110138736B/en
Publication of CN110138736A publication Critical patent/CN110138736A/en
Application granted granted Critical
Publication of CN110138736B publication Critical patent/CN110138736B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an identity authentication method, device and equipment for multiple dynamic random encryption of the Internet of things. Wherein the method comprises the following steps: according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses an identity authentication token to interact with an identity authentication server in a mode of encrypting and communicating after conforming to an online fast identity authentication standard information format through the Internet of things, further decrypts and restores the online fast identity authentication standard information, and informs the second user equipment of allowing the right of use of the first user equipment after the online fast identity authentication standard information passes through the record in a security calculation comparison database. Through the mode, the limitation of the traditional universal serial bus interface can be improved by adopting a universal Internet of things interface, the identity authentication function can be fused in the dynamic random encryption communication mode, and the electronic information safety is improved.

Description

Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things
Technical Field
The invention relates to the technical field of computer electronic information security, in particular to an identity authentication method, device and equipment for multiple dynamic random encryption of the Internet of things.
Background
With the continuous development of the technology and the application of the internet of things in the world, various services between the inside and the outside of an enterprise are operated more and more depending on an information system and a network platform. The new trend has higher and higher requirements on the management of various resources such as enterprise-related personal resources, finance, production, research and development and the like. Subjectively, it is necessary to improve or even confirm the tamper resistance and non-repudiation of the related information content by a certain means.
FIDO (Fast Identity authentication) is an Identity authentication standard, changes the existing Online authentication mode, and can remove the dependence on passwords when authenticating users. At present, the on-line fast identity authentication FIDO standard is mostly implemented on an authentication device by using USB (Universal Serial Bus), bluetooth or NFC (Near Field Communication), but these connection methods have limitations of a certain distance and interface category.
To protect various resources and devices from unauthorized access, vandalism, spying, and malicious attacks, security products or security solutions need to be used for various resources and devices. Network communication is a key link related to safety in an information construction process, and a safe encryption communication method needs to be developed, so that the safety of the communication process is enhanced, and data information transmitted in a network is effectively protected. The traditional network equipment has insufficient encryption protection on communication data and is not suitable for being applied to various industrial information networks with higher information security requirements. In addition, at present, in each industrial information network, managers are required to manually configure keys, and hidden danger of disclosure of human factors exists.
The chinese utility model patent of "CN 205545352U a separate type identity authentication device based on USB equipment and FIDO standard" and the chinese invention patent of "CN 108092776A an identity authentication server and identity authentication token" both adopt the scheme of on-line fast identity authentication FIDO separate type identity authentication device limited to USB interface of USB, that is, it is impossible to perform identity authentication on equipment lacking USB interface of USB.
Although the Chinese patent invention 'CN 108111308A an industrial internet communication encryption method based on dynamic random encryption' has considerable communication encryption security, the identity authentication factor is not taken into consideration, namely, the problem that the encryption communication method is not fused with identity authentication exists.
However, the inventors found that at least the following problems exist in the prior art:
in summary, the existing identity authentication scheme is limited to the scheme of the on-line fast identity authentication FIDO split identity authentication apparatus for the USB interface of the USB, that is, the identity authentication cannot be performed on the device lacking the USB interface of the USB interface, and another scheme that is more often used is that although the communication encryption security is relatively good, the identity authentication factor is not considered.
Disclosure of Invention
In view of the above, the present invention provides an identity authentication method, device and equipment for multiple dynamic random encryption of internet of things, which can improve the limitation of the conventional universal serial bus interface by using a universal internet of things interface, and the dynamic random encryption communication mode can integrate an identity authentication function, thereby improving the security of electronic information.
According to one aspect of the invention, an identity authentication method for multiple dynamic random encryption of the Internet of things is provided, which comprises the following steps:
setting user equipment, an identity authentication server and an identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an Internet of things interface;
each terminal in the Internet of things adopts point-to-point and many-to-many communication modes, and a dynamic random true random number generator is triggered to generate a key according to the use demand opportunity;
enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated secret key;
according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication standard information format and then encrypting communication through the Internet of things, further decrypts and restores the online fast identity authentication standard information, and informs the second user equipment of allowing the right of use of the first user equipment after the online fast identity authentication standard information passes through a record in a security calculation comparison database; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication standard information format through the Internet of things, further decrypts and restores the online fast identity authentication standard information, records the information in a database after safety calculation, and informs the second user equipment of allowing the right of use of the first user equipment.
Each terminal in the internet of things is enabled to adopt point-to-point and many-to-many communication modes, and a dynamic random true random number generator is triggered to generate a secret key according to the use demand opportunity, wherein the method comprises the following steps:
the method has the advantages that the generated secret key is only stored in a local memory, is not stored in a temporary storage hard disk and is not transmitted on the network by triggering the dynamic random number generator to generate the secret key locally according to the use requirement through each terminal in the internet of things.
Enabling each terminal in the internet of things to form multiple dynamic random working characteristics according to the generated secret key, wherein the multiple dynamic random working characteristics comprise:
and enabling each terminal in the internet of things to locally generate a random number according to the generated secret key, sending the random number to each terminal in other internet of things for collection, and simultaneously receiving the random number transmitted by each terminal in other internet of things to form the multiple dynamic random working characteristics.
When a user requests to log in according to the formed multiple dynamic random working characteristics, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encryption communication after conforming to an online fast identity authentication standard information format through the Internet of things, further decrypts and restores the online fast identity authentication standard information, compares the online fast identity authentication standard information with a security calculation database and informs the second user equipment of allowing the right of use of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication standard information format through the internet of things, further decrypts and restores online fast identity authentication standard information, records the online fast identity authentication standard information in a database after safety calculation, and notifies the second user equipment that the right of use of the first user equipment is allowed, and the method further comprises the following steps:
enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the right of the first user equipment in a point-to-point mode through the first user equipment, terminating the monitoring program on each terminal in the Internet of things, and enabling the generated secret key to disappear.
According to another aspect of the present invention, there is provided an identity authentication device with multiple dynamic random encryption of internet of things, including:
the device comprises a setting module, a generating module, a forming module and a requesting module;
the setting module is used for setting the user equipment, the identity authentication server and the identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an Internet of things interface;
the generation module is used for triggering a dynamic random use true random number generator to generate a secret key according to use requirements by adopting point-to-point and many-to-many communication modes at each terminal in the Internet of things;
the forming module is used for enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated secret key;
the request module is used for further using the identity authentication token to interact with the identity authentication server in a mode of encryption communication after conforming to an online fast identity authentication standard information format through the Internet of things when a user requests to log in according to the formed multiple dynamic random working characteristics, further decrypting and restoring the online fast identity authentication standard information, comparing the online fast identity authentication standard information with a security calculation and comparing the online fast identity authentication standard information with a database, and informing the second user equipment of allowing the right of use of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication standard information format through the Internet of things, further decrypts and restores the online fast identity authentication standard information, records the information in a database after safety calculation, and informs the second user equipment of allowing the right of use of the first user equipment.
The generation module is specifically configured to:
the method has the advantages that the generated secret key is only stored in a local memory, is not stored in a temporary storage hard disk and is not transmitted on the network by triggering the dynamic random number generator to generate the secret key locally according to the use requirement through each terminal in the internet of things.
Wherein the forming module is specifically configured to:
and enabling each terminal in the internet of things to locally generate a random number according to the generated secret key, sending the random number to each terminal in other internet of things for collection, and simultaneously receiving the random number transmitted by each terminal in other internet of things to form the multiple dynamic random working characteristics.
Wherein, the multiple dynamic random encrypted identity authentication device of thing networking still includes:
and the revocation device is used for enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the use right of the first user equipment in a point-to-point mode by the first user equipment, terminating the monitoring program on each terminal in the internet of things and enabling the generated secret key to disappear.
According to another aspect of the present invention, there is provided an identity authentication device with multiple dynamic random encryption of internet of things, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods for identity authentication with multiple dynamic random encryption for internet of things.
According to still another aspect of the present invention, there is provided a computer-readable storage medium storing a computer program, which when executed by a processor, implements the identity authentication method of multiple dynamic random encryption of the internet of things described in any one of the above.
It can be found that, in the above scheme, a user equipment, an identity authentication server, and an identity authentication token can be set in the internet of things, wherein the identity authentication token is a mobile communication terminal with an interface of the internet of things, and each terminal in the internet of things adopts a point-to-point and many-to-many communication mode, a dynamic random number generator is triggered to be used at random according to the use requirement to generate a secret key, each terminal in the internet of things forms multiple dynamic random working characteristics according to the generated secret key, and according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server through the internet of things in a mode of encrypting communication after conforming to an online fast identity authentication standard information format, further decrypts and restores the online fast identity authentication standard information after the record passes through a security calculation comparison database, notifying the second user equipment of permission of the use right of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encrypting communication after conforming to an online fast identity authentication standard information format through the Internet of things, the online fast identity authentication standard information is further decrypted and restored, and the online fast identity authentication standard information is recorded in a database after being safely calculated, and the second user equipment is informed of allowing the right of use of the first user equipment, so that the limitation of improving a traditional universal serial bus interface through a universal Internet of things interface can be realized, and the dynamic random encryption communication mode can integrate an identity authentication function, and the electronic information safety is improved.
Furthermore, the above scheme can make the first user equipment in the internet of things transmit the identity authentication token through the internet of things, adopt point-to-point and many-to-many communication modes, send a request to log in or register to the identity authentication server to obtain the right of use of the second user equipment, the identity authentication server sends a request to generate a random number to the identity authentication token and the second user equipment, each terminal in the internet of things triggers the dynamic random use true random number generator to generate a secret key locally according to the use requirement, the advantage of this is that the dynamic random use true random number generator can be triggered to generate the key locally according to the use requirement by each terminal in the internet of things, the generated key is only temporarily stored in a local memory, is not stored in a local hard disk and is not transmitted on the network, so that the risk of various keys in the local and the network being leaked is effectively avoided.
Further, according to the above scheme, each terminal in the internet of things can locally generate a random number according to the generated secret key, and send the random number to each terminal in other internet of things for collection, and meanwhile, receive the random number transmitted by each terminal in other internet of things to form a multiple dynamic random working characteristic, which can improve information security.
Further, according to the above scheme, the first user equipment can revoke the second user equipment, the first user equipment notifies the identity authentication server and the second user equipment in a point-to-point manner of revoking the right of use of the first user equipment, and terminates the monitoring program on each terminal in the internet of things, so that the generated key disappears, and the right of use of the user equipment can be revoked.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of an embodiment of an identity authentication method using multiple dynamic random encryption of the Internet of things of the present invention;
FIG. 2 is a schematic flow chart of an identity authentication method using multiple dynamic random encryption of the Internet of things according to another embodiment of the invention;
fig. 3 is a schematic structural diagram of an embodiment of an identity authentication device with multiple dynamic random encryption of the internet of things according to the present invention;
FIG. 4 is a schematic structural diagram of an identity authentication device with multiple dynamic random encryption of the Internet of things according to another embodiment of the invention;
fig. 5 is a schematic structural diagram of an embodiment of an identity authentication device with multiple dynamic random encryption in the internet of things.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be noted that the following examples are only illustrative of the present invention, and do not limit the scope of the present invention. Similarly, the following examples are only some but not all examples of the present invention, and all other examples obtained by those skilled in the art without any inventive work are within the scope of the present invention.
The invention provides an identity authentication method of multiple dynamic random encryption of the Internet of things, which can improve the limitation of the traditional universal serial bus interface by adopting a universal Internet of things interface, and the dynamic random encryption communication mode can integrate the identity authentication function, thereby improving the security of electronic information.
Referring to fig. 1, fig. 1 is a schematic flow chart of an embodiment of an identity authentication method based on multiple dynamic random encryption of the internet of things. It should be noted that the method of the present invention is not limited to the flow sequence shown in fig. 1 if the results are substantially the same. As shown in fig. 1, the method comprises the steps of:
s101: setting user equipment, an identity authentication server and an identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an interface of the Internet of things.
In this embodiment, the identity authentication token may further have various wired network interfaces, wireless network interfaces, and the like, which is not limited in the present invention.
S102: each terminal in the internet of things adopts a P2P (Peer-TO-Peer) and many-TO-many communication mode, and triggers a dynamic random true random number generator TO generate a key according TO the use demand opportunity.
The method for triggering the dynamic random use true random number generator to generate the key according to the use requirement opportunity by using point-to-point and many-to-many communication modes at each terminal in the internet of things can comprise the following steps:
the method has the advantages that the generated secret key is only stored in a local memory and not stored in a temporary storage local hard disk, and is not transmitted on the network, so that the risk of leakage of various secret keys in the local memory and the network is effectively avoided.
In this embodiment, each terminal in the internet of things may generate the same key through a key generation algorithm according to a plurality of random numbers.
S103: and enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated key.
Wherein, the enabling each terminal in the internet of things to form multiple dynamic random working characteristics according to the generated secret key may include:
each terminal in the internet of things locally generates a random number according to the generated secret key, and sends the random number to each terminal in other internet of things for collection, and meanwhile, receives the random number transmitted by each terminal in other internet of things to form a multiple dynamic random working characteristic, so that the advantage is that the information security can be improved.
In this embodiment, for example, the user equipment a may send a request to log in or register to the identity authentication server B to obtain the right to use the user equipment C by using the mobile communication terminal of the identity authentication token through the internet of things, the identity authentication server B sends a request to generate a random number to the user identity authentication token a and the user equipment C, each terminal of the internet of things A, B, C locally uses the true random number generator to generate a random number, and sends the random number to each terminal of another internet of things in a peer-to-peer P2P manner for collection, and at the same time, receives the random number transmitted by each terminal of another internet of things. ABC each terminal interactively communicates for example, after time (T + a), the time is summarized to a random number set L1 generated by all terminals, where a is a preset constant and may range from 30 seconds to 300 seconds. If L1 is not empty, then the same key can be generated by a key generation algorithm, and the key is only temporarily recorded in local memory, used by the executing monitor program, not stored on a local hard disk, and not transmitted over a network.
S104: according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication (FIDO) standard information format and then encrypting communication through the Internet of things, further decrypts and restores the online fast identity authentication (FIDO) standard information, and informs the second user equipment of allowing the right of the first user equipment after the online fast identity authentication (FIDO) standard information passes through the record in a security calculation comparison database; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format through the Internet of things, further decrypts and restores the online fast identity authentication FIDO standard information, records the information in a database after safe calculation, and informs the second user equipment of allowing the use right of the first user equipment.
In this embodiment, according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses an identity verification module in the identity authentication token to interact with the identity authentication server through the internet of things in a way of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format, further decrypts and restores the online fast identity authentication FIDO standard information, and notifies the second user equipment of allowing the right of use of the first user equipment after passing through a record in a security calculation comparison database; the identity verification module can be a single key confirmation authentication module, a sound wave confirmation authentication module, a fingerprint identification authentication module, a voiceprint identification authentication module or a face identification authentication module and the like.
In this embodiment, according to the formed multiple dynamic random operating characteristics, when a user requests to log in, the first user equipment further uses an identity verification module in the identity authentication token to interact with the identity authentication server through the internet of things in a manner of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format, further decrypts and restores the online fast identity authentication FIDO standard information, records the information in a database after security calculation, and notifies the second user equipment of allowing the use right of the first user equipment; the identity verification module can be a single key confirmation authentication module, a sound wave confirmation authentication module, a fingerprint identification authentication module, a voiceprint identification authentication module or a face identification authentication module and the like.
When a user requests to log in according to the formed multiple dynamic random working characteristics, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encryption communication after conforming to an online fast identity authentication FIDO standard information format through the Internet of things, further decrypts and restores the online fast identity authentication FIDO standard information, compares the online fast identity authentication FIDO standard information with a security calculation and compares the online fast identity authentication FIDO standard information with a database, and informs the second user equipment of allowing the right of use of the first user equipment; when a user requests registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server through the internet of things in a way of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format, further decrypts and restores the online fast identity authentication FIDO standard information, records the information in a database after security calculation, and notifies the second user equipment that the right of use of the first user equipment is allowed, and the method further comprises the following steps:
enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the use right of the first user equipment by the first user equipment in a point-to-point P2P mode, terminating the monitoring program on each terminal in the Internet of things, enabling the generated secret key to disappear, and enabling the use right of the user equipment to be revoked.
It can be found that, in this embodiment, a user equipment, an identity authentication server, and an identity authentication token may be set in the internet of things, wherein the identity authentication token is a mobile communication terminal having an interface of the internet of things, and each terminal in the internet of things is enabled to adopt a point-to-point and many-to-many communication manner, and dynamically and randomly use a true random number generator to generate a secret key according to a use requirement time, and each terminal in the internet of things is enabled to form multiple dynamic random working characteristics according to the generated secret key, and according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a manner of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format through the internet of things, further decrypts and restores the online fast identity authentication FIDO standard information after the secure computation comparison database passes, notifying the second user equipment of permission of the use right of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encrypting and communicating after conforming to an online fast identity authentication (FIDO) standard information format through the Internet of things, the online fast identity authentication (FIDO) standard information is further decrypted and restored and is recorded in a database after being safely calculated, the second user equipment is informed of allowing the right of use of the first user equipment, the limitation that a traditional universal serial bus interface is improved through a universal Internet of things interface can be realized, the dynamic random encryption communication mode can integrate an identity authentication function, and the electronic information safety is improved.
Further, in this embodiment, the first user equipment in the internet of things may transmit a request to log in or register to obtain the right of use of the second user equipment to the identity authentication server in a peer-to-peer and many-to-many communication manner through the internet of things by using the identity authentication token, the identity authentication server sends a request to generate a random number to the identity authentication token and the second user equipment, each terminal in the internet of things triggers the dynamic random use true random number generator to generate a secret key locally according to the use requirement, the advantage of this is that the dynamic random use true random number generator can be triggered to generate the key locally according to the use requirement by each terminal in the internet of things, the generated key is only temporarily stored in a local memory, is not stored in a local hard disk and is not transmitted on the network, so that the risk of various keys in the local and the network being leaked is effectively avoided.
Further, in this embodiment, each terminal in the internet of things can locally generate a random number according to the generated secret key, and send the random number to each terminal in other internet of things for collection, and at the same time, receive the random number transmitted by each terminal in other internet of things to form a multiple dynamic random working characteristic, which is beneficial to improving information security.
Referring to fig. 2, fig. 2 is a schematic flow chart of an identity authentication method using multiple dynamic random encryption in the internet of things according to another embodiment of the present invention. In this embodiment, the method includes the steps of:
s201: setting user equipment, an identity authentication server and an identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an interface of the Internet of things.
As described above in S101, further description is omitted here.
S202: each terminal in the Internet of things adopts point-to-point and many-to-many communication modes, and a dynamic random true random number generator is triggered to generate a key according to the use demand opportunity.
As described above in S102, further description is omitted here.
S203: and enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated key.
As described above in S103, which is not described herein.
S204: according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication (FIDO) standard information format and then encrypting communication through the Internet of things, further decrypts and restores the online fast identity authentication (FIDO) standard information, and informs the second user equipment of allowing the right of the first user equipment after the online fast identity authentication (FIDO) standard information passes through the record in a security calculation comparison database; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format through the Internet of things, further decrypts and restores the online fast identity authentication FIDO standard information, records the information in a database after safe calculation, and informs the second user equipment of allowing the use right of the first user equipment.
As described above in S104, and will not be described herein.
S205: and enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the right of the first user equipment by the first user equipment in a peer-to-peer P2P mode, and terminating the monitoring program on each terminal in the Internet of things to make the generated key disappear.
It can be found that, in this embodiment, the first user device may revoke the second user device, the first user device notifies the identity authentication server and the second user device to revoke the right to use the first user device in a peer-to-peer P2P manner, and terminates the monitoring program on each terminal in the internet of things, so that the generated key disappears, and the right to use the user device can be revoked.
The invention also provides an identity authentication device for multiple dynamic random encryption of the Internet of things, which can improve the limitation of the traditional universal serial bus interface by adopting a universal Internet of things interface, and the dynamic random encryption communication mode can integrate the identity authentication function, thereby improving the security of electronic information.
Referring to fig. 3, fig. 3 is a schematic structural diagram of an embodiment of an identity authentication device with multiple dynamic random encryption in the internet of things. The identity authentication device 30 with multiple dynamic random encryption of the internet of things comprises a setting module 31, a generating module 32, a forming module 33 and a requesting module 34.
The setting module 31 is configured to set the user equipment, the identity authentication server, and the identity authentication token in the internet of things; the identity authentication token is a mobile communication terminal with an interface of the Internet of things.
The generating module 32 is configured to enable each terminal in the internet of things to adopt a point-to-point and many-to-many communication mode, and trigger a dynamic random true random number generator to generate a key according to a use requirement opportunity.
The forming module 33 is configured to enable each terminal in the internet of things to form multiple dynamic random operating characteristics according to the generated secret key.
The request module 34 is configured to, according to the formed multiple dynamic random working characteristics, when a user requests to log in, further use the identity authentication token to interact with the identity authentication server through the internet of things in a manner of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format, further decrypt and restore the online fast identity authentication FIDO standard information, compare the online fast identity authentication FIDO standard information with a security calculation and compare the online fast identity authentication FIDO standard information with a database, and notify the second user equipment of permission of the use right of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication FIDO standard information format through the Internet of things, further decrypts and restores the online fast identity authentication FIDO standard information, records the information in a database after safe calculation, and informs the second user equipment of allowing the use right of the first user equipment.
Optionally, the generating module 32 may be specifically configured to:
the method has the advantages that the first user equipment in the Internet of things uses an identity authentication token to penetrate through the Internet of things, a point-to-point and many-to-many communication mode is adopted, a request is sent to the identity authentication server to log in or register to obtain the use right of the second user equipment, the identity authentication server sends a random number generation request to the identity authentication token and the second user equipment, and each terminal in the Internet of things triggers a dynamic random true random number generator to generate a secret key on the machine locally according to the use requirement.
Optionally, the forming module 33 may be specifically configured to:
and meanwhile, the random numbers transmitted by the terminals in the other internet of things are received, so that the multiple dynamic random working characteristics are formed.
Referring to fig. 4, fig. 4 is a schematic structural diagram of an identity authentication device with multiple dynamic random encryption in the internet of things according to another embodiment of the present invention. Different from the previous embodiment, the identity authentication device 40 with multiple dynamic random encryption of the internet of things according to this embodiment further includes: the module 41 is revoked.
The revoking module 41 is configured to revoke the second user device from the first user device, notify the identity authentication server and the second user device to revoke the right of the first user device in a peer-to-peer P2P manner by the first user device, terminate the monitoring program on each terminal in the internet of things, and make the generated key disappear.
Each unit module of the multiple dynamic random encryption identity authentication device 30/40 of the internet of things can respectively execute the corresponding steps in the above method embodiments, so that the details of each unit module are not repeated herein, and please refer to the description of the corresponding steps above in detail.
The invention also provides an identity authentication device for multiple dynamic random encryption of the internet of things, as shown in fig. 5, comprising: at least one processor 51; and a memory 52 communicatively coupled to the at least one processor 51; the memory 52 stores instructions executable by the at least one processor 51, and the instructions are executed by the at least one processor 51, so that the at least one processor 51 can execute the identity authentication method of multiple dynamic random encryption of the internet of things.
Wherein the memory 52 and the processor 51 are coupled in a bus, which may comprise any number of interconnected buses and bridges, which couple one or more of the various circuits of the processor 51 and the memory 52 together. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor 51 is transmitted over a wireless medium via an antenna, which further receives the data and transmits the data to the processor 51.
The processor 51 is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory 52 may be used to store data used by the processor 51 in performing operations.
The present invention further provides a computer-readable storage medium storing a computer program. The computer program realizes the above-described method embodiments when executed by a processor.
It can be found that, in the above scheme, a user equipment, an identity authentication server, and an identity authentication token can be set in the internet of things, wherein the identity authentication token is a mobile communication terminal with an interface of the internet of things, and each terminal in the internet of things adopts a point-to-point and many-to-many communication mode, a dynamic random number generator is triggered to be used at random according to the use requirement to generate a secret key, each terminal in the internet of things forms multiple dynamic random working characteristics according to the generated secret key, and according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server through the internet of things in a mode of encrypting communication after conforming to an online fast identity authentication standard information format, further decrypts and restores the online fast identity authentication standard information after the record passes through a security calculation comparison database, notifying the second user equipment of permission of the use right of the first user equipment; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encrypting communication after conforming to an online fast identity authentication standard information format through the Internet of things, the online fast identity authentication standard information is further decrypted and restored, and the online fast identity authentication standard information is recorded in a database after being safely calculated, and the second user equipment is informed of allowing the right of use of the first user equipment, so that the limitation of improving a traditional universal serial bus interface through a universal Internet of things interface can be realized, and the dynamic random encryption communication mode can integrate an identity authentication function, and the electronic information safety is improved.
Furthermore, the above scheme can make the first user equipment in the internet of things transmit the identity authentication token through the internet of things, adopt point-to-point and many-to-many communication modes, send a request to log in or register to the identity authentication server to obtain the right of use of the second user equipment, the identity authentication server sends a request to generate a random number to the identity authentication token and the second user equipment, each terminal in the Internet of things triggers the dynamic random use true random number generator to generate a secret key locally according to the use requirement, the advantage of this is that the dynamic random use true random number generator can be triggered to generate the key locally according to the use requirement by each terminal in the internet of things, the generated key is only temporarily stored in a local memory, is not stored in a local hard disk and is not transmitted on the network, so that the risk of various keys in the local and the network being leaked is effectively avoided.
Further, according to the above scheme, each terminal in the internet of things can locally generate a random number according to the generated secret key, and send the random number to each terminal in other internet of things for collection, and meanwhile, receive the random number transmitted by each terminal in other internet of things to form a multiple dynamic random working characteristic, which can improve information security.
Further, according to the above scheme, the first user equipment can revoke the second user equipment, the first user equipment notifies the identity authentication server and the second user equipment in a point-to-point manner of revoking the right of use of the first user equipment, and terminates the monitoring program on each terminal in the internet of things, so that the generated key disappears, and the right of use of the user equipment can be revoked.
In the several embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is only one type of logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a part of the embodiments of the present invention, and not intended to limit the scope of the present invention, and all equivalent devices or equivalent processes performed by the present invention through the contents of the specification and the drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (6)

1. An identity authentication method for multiple dynamic random encryption of the Internet of things is characterized by comprising the following steps:
setting user equipment, an identity authentication server and an identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an Internet of things interface;
each terminal in the Internet of things adopts point-to-point and many-to-many communication modes, and a dynamic random true random number generator is triggered to generate a key according to the use demand opportunity;
enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated secret key;
according to the formed multiple dynamic random working characteristics, when a user requests to log in, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of encryption communication after conforming to an online fast identity authentication standard information format through the Internet of things, further decrypts and restores the online fast identity authentication standard information, and informs the second user equipment of allowing the right of use of the first user equipment after the online fast identity authentication standard information passes through the record in a security calculation comparison database; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication standard information format and then encrypting communication through the Internet of things, further decrypts and restores the online fast identity authentication standard information, records the information in a database after safety calculation, and informs the second user equipment of allowing the right of use of the first user equipment;
each terminal in the internet of things adopts point-to-point and many-to-many communication modes, and triggers a dynamic random true random number generator to generate a key according to the use demand opportunity, which comprises the following steps:
enabling the first user equipment in the internet of things to transmit a request for logging in or registering to the identity authentication server to obtain the right of the second user equipment through the internet of things by using the identity authentication token, enabling the identity authentication server to transmit a request for generating a random number to the first user equipment and the second user equipment, enabling each terminal of the first user equipment, the identity authentication server and the second user equipment to locally use a true random number generator to generate a random number, enabling each terminal of the first user equipment, the identity authentication server and the second user equipment to interactively communicate, transmitting the random number to each terminal of other internet of things in a peer-to-peer (P2P) mode to complete, simultaneously receiving random numbers transmitted by each terminal of other internet of things, and completing a random number set L1 generated by all terminals after the interactive communication (T + a) time of each terminal, the value a is a preset constant and ranges from 30 seconds to 300 seconds, if the L1 is not empty, the same key is generated through a key generation algorithm, and the key is only temporarily recorded in a local memory and is used by an executing monitoring program.
2. The multiple dynamic random encryption identity authentication method of the internet of things as claimed in claim 1, wherein when a user requests to log in according to the formed multiple dynamic random working characteristics, the first user equipment further uses the identity authentication token to interact with the identity authentication server through the internet of things in a way of encrypting and communicating after conforming to an online fast identity authentication standard information format, further decrypts and restores the online fast identity authentication standard information, and notifies the second user equipment of allowing the right of use of the first user equipment after passing through a record in a security calculation comparison database; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a way of encrypting and communicating after conforming to an online fast identity authentication standard information format through the internet of things, further decrypts and restores online fast identity authentication standard information, records the online fast identity authentication standard information in a database after safety calculation, and notifies the second user equipment that the right of use of the first user equipment is allowed, and the method further comprises the following steps:
enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the right of the first user equipment in a point-to-point mode through the first user equipment, terminating the monitoring program on each terminal in the Internet of things, and enabling the generated secret key to disappear.
3. The utility model provides a multiple dynamic random encryption's of thing networking authentication device which characterized in that includes:
the device comprises a setting module, a generating module, a forming module and a requesting module;
the setting module is used for setting the user equipment, the identity authentication server and the identity authentication token in the Internet of things; the identity authentication token is a mobile communication terminal with an Internet of things interface;
the generation module is used for triggering a dynamic random use true random number generator to generate a secret key according to the use requirement opportunity by adopting point-to-point and many-to-many communication modes at each terminal in the Internet of things;
the forming module is used for enabling each terminal in the Internet of things to form multiple dynamic random working characteristics according to the generated secret key;
the request module is used for further using the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication standard information format and then encrypting communication through the Internet of things when a user requests to log in according to the formed multiple dynamic random working characteristics, further decrypting and restoring the online fast identity authentication standard information, comparing the online fast identity authentication standard information with a security calculation database, and informing a second user device of allowing the right of use of the first user device; when a user requests for registration, the first user equipment further uses the identity authentication token to interact with the identity authentication server in a mode of meeting an online fast identity authentication standard information format and then encrypting communication through the Internet of things, further decrypts and restores the online fast identity authentication standard information, records the information in a database after safety calculation, and informs the second user equipment of allowing the right of use of the first user equipment;
the generation module is specifically configured to: when the first user equipment in the internet of things sends a request to log in or register to the identity authentication server through the internet of things by using the identity authentication token to obtain the right of use of second user equipment, the identity authentication server sends a request for generating a random number to the identity authentication token and the second user equipment, each terminal of the first user equipment, the identity authentication server and the second user equipment locally uses a true random number generator to generate a random number, and each terminal of the first user equipment, the identity authentication server and the second user equipment interactively communicates with each other and sends the random number to each terminal in other internet of things for remitting through a point-to-point P2P mode, meanwhile, the random numbers transmitted by each terminal in other internet of things are received, then the same secret key is generated through a secret key generation algorithm and is only temporarily recorded in a local memory, is used by the executing monitor program.
4. The internet-of-things multiple dynamic random encryption identity authentication device of claim 3, further comprising:
and the revocation device is used for enabling the first user equipment to revoke the second user equipment, informing the identity authentication server and the second user equipment to revoke the use right of the first user equipment in a point-to-point mode by the first user equipment, terminating the monitoring program on each terminal in the internet of things and enabling the generated secret key to disappear.
5. The utility model provides an identity authentication equipment of multiple dynamic random encryption of thing networking which characterized in that includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of internet of things multiple dynamic random encryption identity authentication as claimed in any one of claims 1 to 2.
6. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the identity authentication method for multiple dynamic random encryption of internet of things according to any one of claims 1 to 2.
CN201910289318.9A 2019-04-11 2019-04-11 Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things Active CN110138736B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910289318.9A CN110138736B (en) 2019-04-11 2019-04-11 Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910289318.9A CN110138736B (en) 2019-04-11 2019-04-11 Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things

Publications (2)

Publication Number Publication Date
CN110138736A CN110138736A (en) 2019-08-16
CN110138736B true CN110138736B (en) 2022-05-13

Family

ID=67569604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910289318.9A Active CN110138736B (en) 2019-04-11 2019-04-11 Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things

Country Status (1)

Country Link
CN (1) CN110138736B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110740128B (en) * 2019-09-27 2022-08-23 武汉虹识技术有限公司 Offline data encryption method and device
CN114845302B (en) * 2022-03-30 2023-01-10 慧之安信息技术股份有限公司 Near field encryption communication method and system based on Internet of things
CN115242545B (en) * 2022-08-06 2023-12-08 山西工程科技职业大学 Security management method and system for equipment data of Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
TW201541977A (en) * 2013-04-26 2015-11-01 內數位專利控股公司 Policy federation framework for facilitating multi-factor authentication using SSO systems
CN206962852U (en) * 2017-07-11 2018-02-02 上海互啊佑智能科技有限公司 FIDO Internet of Things subscriber authentication devices based on fingerprint identification technology
CN108092776A (en) * 2017-12-04 2018-05-29 南京南瑞信息通信科技有限公司 A kind of authentication server and authentication token
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2533348B (en) * 2014-12-17 2021-07-07 Arm Ip Ltd Management of relationships between a device and a service provider

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201541977A (en) * 2013-04-26 2015-11-01 內數位專利控股公司 Policy federation framework for facilitating multi-factor authentication using SSO systems
CN103491094A (en) * 2013-09-26 2014-01-01 成都三零瑞通移动通信有限公司 Rapid identity authentication method based on C/S mode
CN206962852U (en) * 2017-07-11 2018-02-02 上海互啊佑智能科技有限公司 FIDO Internet of Things subscriber authentication devices based on fingerprint identification technology
CN108092776A (en) * 2017-12-04 2018-05-29 南京南瑞信息通信科技有限公司 A kind of authentication server and authentication token
CN108111308A (en) * 2017-12-25 2018-06-01 北京康拓科技有限公司 One kind is based on the encrypted industry internet communication encryption method of dynamic random

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
FIDO-U2F-COMPLETE-v1.2;FIDO Alliance;《FIDO Alliance》;20170411;全文 *

Also Published As

Publication number Publication date
CN110138736A (en) 2019-08-16

Similar Documents

Publication Publication Date Title
CN110519046B (en) Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD
CN110049016B (en) Data query method, device, system, equipment and storage medium of block chain
CN100388244C (en) Method for long-distance changing of communication cipher code
CN109379189B (en) Block chain account key backup and recovery method, device, terminal and system
CN110138736B (en) Identity authentication method, device and equipment for multiple dynamic random encryption of Internet of things
CN111404664B (en) Quantum secret communication identity authentication system and method based on secret sharing and multiple mobile devices
CN102098317A (en) Data transmitting method and system applied to cloud system
US10686771B2 (en) User sign-in and authentication without passwords
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN110138548B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol
CN110380859B (en) Quantum communication service station identity authentication method and system based on asymmetric key pool pair and DH protocol
CN101964805B (en) Method, equipment and system for safely sending and receiving data
CN110505055A (en) Based on unsymmetrical key pond to and key card outer net access identity authentication method and system
CN101944216A (en) Two-factor online transaction safety authentication method and system
CN113890724A (en) Access authentication method and system for power Internet of things communication equipment
CN110365472B (en) Quantum communication service station digital signature method and system based on asymmetric key pool pair
CN110519222B (en) External network access identity authentication method and system based on disposable asymmetric key pair and key fob
CN110098925B (en) Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number
CN108768650B (en) Short message verification system based on biological characteristics
WO2024139347A1 (en) Method, system and apparatus for securely acquiring sensitive information, and electronic device
CN112422280B (en) Man-machine control interaction method, interaction system, computer equipment and storage medium
CN110266483B (en) Quantum communication service station key negotiation method, system and device based on asymmetric key pool pair and QKD
KR20120084631A (en) Authentication system and method based by unique identifier
KR102053993B1 (en) Method for Authenticating by using Certificate
CN116318637A (en) Method and system for secure network access communication of equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant