CN110166468A - Data authentication method and device - Google Patents

Data authentication method and device Download PDF

Info

Publication number
CN110166468A
CN110166468A CN201910450095.XA CN201910450095A CN110166468A CN 110166468 A CN110166468 A CN 110166468A CN 201910450095 A CN201910450095 A CN 201910450095A CN 110166468 A CN110166468 A CN 110166468A
Authority
CN
China
Prior art keywords
data
authentication
session
encryption equipment
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910450095.XA
Other languages
Chinese (zh)
Inventor
周游
仇兆峰
韩毅
单宏寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Original Assignee
Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Silver Based Information Security Technology Ltd By Share Ltd filed Critical Shanghai Silver Based Information Security Technology Ltd By Share Ltd
Priority to CN201910450095.XA priority Critical patent/CN110166468A/en
Publication of CN110166468A publication Critical patent/CN110166468A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The embodiment of the invention discloses a kind of data authentication method and devices.This method is applied to terminal to be certified, comprising: receives the identification authentication data generated by encryption equipment;The identification authentication data is verified, after verification passes through, generates identity authentication result, and the identity authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and session authentication result is sent to encryption equipment.Identification authentication data and session authentication data are generated by encryption equipment, since the safety coefficient of encryption equipment is high, for the embodiment of the present invention so as to improve the safety and accuracy of data authentication, terminal to be certified authenticates identity data and session authentication data, improves authentication efficiency.

Description

Data authentication method and device
Technical field
The present embodiments relate to authentication techniques more particularly to a kind of data authentication methods and device.
Background technique
The method of data authentication is widely used in every field, during certification, cloud is needed to be authenticated.Wait recognize Card terminal gets the data of terminal to be used, and terminal to be certified is by the data of terminal to be used and terminal own identification to be certified Data are sent to cloud and carry out data authentication, and cloud carries out data authentication, determines that terminal to be certified treats whether using terminal has Access right.However, data are easily revealed, and safety is poor since cloud is vulnerable to attack, certification inaccuracy.
Summary of the invention
The embodiment of the present invention provides a kind of data authentication method and device, solves currently employed cloud and carries out data authentication Method, since cloud is vulnerable to attack, safety is poor, leads to the problem of certification inaccuracy.
In a first aspect, this method is applied to terminal to be certified the embodiment of the invention provides a kind of data authentication method, it should Method includes:
Receive the identification authentication data generated by encryption equipment;
The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the body Part authentication result is sent to encryption equipment;
The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and will Words authentication result is sent to encryption equipment.
Further, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the identification authentication data generated by encryption equipment is received, is specifically included:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein The identification authentication data is generated by the encryption equipment according to the permissions data.
Further, the identity authentication result is sent to encryption equipment, specifically included:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and by data needed for session authentication and the identity authentication result It is sent to encryption equipment, jointly to request the session authentication data.
Further, after session authentication result is sent to encryption equipment, further includes:
Receive the session control data that encryption equipment is sent;
The session control data are executed, and implementing result is sent to encryption equipment.
Second aspect, the embodiment of the invention also provides a kind of data authentication device, which is configured at terminal to be certified, Include:
Receiving module, for receiving the data to be certified generated by encryption equipment;
Authentication module after verification passes through, generates authentication for verifying to the data to be certified As a result, and the identity authentication result is sent to encryption equipment;
Session authentication module, for receive encryption equipment transmission session authentication data, according to the session authentication data into Row session authentication, and session authentication result is sent to encryption equipment.
The third aspect, the embodiment of the invention also provides a kind of data authentication method, this method is applied to encryption equipment, packet It includes:
Generate identification authentication data;
The identification authentication data is sent to terminal to be certified;
Receive identity authentication result;
Session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated;
Receive session authentication result.
Further, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the generation identity card data specifically include:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to described add by the host computer Close machine.
Further, the reception identity authentication result, specifically includes:
Data needed for receiving the identity authentication result and session authentication that the host computer is sent.
Further, the generation session authentication data, comprising:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
Further, after receiving the session authentication result, further includes:
Session control data are generated, and session control data are sent to terminal to be certified.
Further, the generation session control data, specifically include:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, described Data needed for session control are sent to the encryption equipment by the host computer.
Fourth aspect, the embodiment of the invention also provides a kind of data authentication device, which is configured at encryption equipment, packet It includes:
Generation module, for generating identification authentication data;
Sending module, for the identification authentication data to be sent to terminal to be certified;
First receiving module, for receiving identity authentication result;
Session authentication data sending module, for generating session authentication data, by the session authentication data be sent to Certification terminal is authenticated;
Second receiving module, for receiving session authentication result.
Method provided in an embodiment of the present invention is applied to terminal to be certified, by receiving the authentication generated by encryption equipment Data;The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the identity Authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is understood according to the session authentication data Words certification, and session authentication result is sent to encryption equipment, identification authentication data and session authentication data are generated by encryption equipment, Since the safety coefficient of encryption equipment is high, so as to improve the safety and accuracy of data authentication, terminal to be certified is to identity Data and session authentication data are authenticated, and authentication efficiency is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing does one and simply introduces, it should be apparent that, drawings in the following description are some embodiments of the invention, for this For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others Attached drawing.
Fig. 1 is a kind of flow diagram for data authentication method that the embodiment of the present invention one provides;
Fig. 2 is a kind of interaction flow schematic diagram for data authentication that the embodiment of the present invention one provides;
Fig. 3 is a kind of flow diagram of data authentication method provided by Embodiment 2 of the present invention;
Fig. 4 is a kind of structural schematic diagram for data authentication device that the embodiment of the present invention three provides;
Fig. 5 is a kind of structural schematic diagram for data authentication device that the embodiment of the present invention four provides;
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, hereinafter with reference to attached in the embodiment of the present invention Figure, clearly and completely describes technical solution of the present invention by embodiment, it is clear that described embodiment is the present invention one Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is a kind of flow chart for data authentication method that the embodiment of the present invention one provides, and Fig. 2 is the embodiment of the present invention one The interaction schematic diagram of the data authentication method of offer.The technical solution of the present embodiment can be adapted for terminal to be certified, host computer, Data authentication process between encryption equipment three.Wherein, terminal to be certified all can connect for engine end, intelligent door lock etc. Enter the terminal device that in Internet of Things and available intelligent terminal is controlled.Host computer can be intelligent terminal (such as mobile phone, intelligence Wearable device, tablet computer or computer etc.).The present embodiment will be illustrated so that terminal to be certified is engine end as an example, but ability Field technique personnel are appreciated that all terminal devices that can be controlled with intelligent terminal, all can serve as terminal to be certified, this reality It is without limitation to apply example.
Data authentication method provided in this embodiment is applied to terminal to be certified, specifically includes following operation:
The identification authentication data that S110, reception are generated by encryption equipment.
In the present embodiment, terminal to be certified can be communicatively coupled by host computer and encryption equipment.It specifically, can be first in vehicle Communication connection is established between generator terminal and host computer, as Bluetooth communication connects.After establishing communication connection, host computer can be by permissions data It is sent to encryption equipment, to request identification authentication data, to start identifying procedure.Encryption equipment can be according to the permissions data received Generate identification authentication data.Specifically, encryption equipment can carry out preset calculating to the permissions data after obtaining permissions data, And according to calculated value and permissions data, identification authentication data is generated.In practical applications, the preset calculating can be Signature or other algorithms obtain signature value, and utilize label for example, encryption equipment can do signature operation to permissions data using private key Name value and permissions data generate identification authentication data.The permissions data may include operating right, Time Validity etc..
After generating identification authentication data, which can be sent to engine end by host computer by encryption equipment.
S120, the identification authentication data is verified, after verification passes through, generates identity authentication result, and will The identity authentication result is sent to encryption equipment.
Engine end verifies identification authentication data, can also include solving before verification to identification authentication data It is close, the identification authentication data after decryption is verified.Specifically, when being verified to the identification authentication data after decryption The correctness and validity of permissions data can be verified.After verification passes through, engine end passes through identity authentication result upper Machine is sent to encryption equipment.
Host computer can also obtain data needed for session authentication when receiving identity authentication result, and by session authentication institute Data and the identity authentication result are needed to be sent to encryption equipment jointly, to request the session authentication data.
S130, the session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and Session authentication result is sent to encryption equipment.
After data needed for encryption equipment receives identity authentication result and session authentication, key data is generated, and utilize key The data deciphering identity authentication result.Data needed for the session authentication include unique code, the host computer of permissions data, end to be certified Identity information etc..Encryption equipment data according to needed for the session authentication generate character string, and utilize the key data encryption character String generates session authentication data.Hereafter, the session authentication data etc. is sent to host computer by encryption equipment jointly.Host computer will Words authentication data is sent to engine end.
Engine end receive session authentication data after, decrypted session authentication data, and to the session authentication data after decryption into Row verification obtains session authentication result after verification passes through.Then encryption equipment will be sent to after the encryption of session authentication result.It is upper Machine receive engine end send session authentication as a result, and obtain data needed for session control, then by the session authentication result with Data needed for the session control are sent to encryption equipment jointly.
Further, host computer is after being sent to encryption equipment for session authentication result, further includes: receives encryption equipment and sends Session control data;The session control data are executed, and implementing result is sent to encryption equipment.
After encryption equipment data needed for receiving session authentication result and session control, first computation key data, with decryption The session authentication result.Data needed for the session control may include permissions data, unique code of engine end, original control instruction number According to etc..Data needed for encryption equipment utilizes the session control generate session control data.
After generating session control data, the data such as session control are sent to together host computer by encryption equipment altogether.Host computer will Words control data are sent to engine end.Engine end executes session control data, and returns to implementing result to encryption by host computer Machine.
Last encryption equipment and end to be certified generate session key through consultation, and decrypt the execution knot using the session key Fruit.Hereafter, the implementing result after decryption can be fed back to host computer by encryption equipment.
Method provided in an embodiment of the present invention is applied to terminal to be certified, by receiving the authentication generated by encryption equipment Data;The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the identity Authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is understood according to the session authentication data Words certification, and session authentication result is sent to encryption equipment, identification authentication data and session authentication data are generated by encryption equipment, Since the safety coefficient of encryption equipment is high, so as to improve the safety and accuracy of data authentication, terminal to be certified is to identity Data and session authentication data are authenticated, and authentication efficiency is improved.
Embodiment two
Fig. 3 is a kind of flow chart of data authentication method provided by Embodiment 2 of the present invention.The technical solution of the present embodiment It can be adapted for terminal to be certified, host computer, the data authentication process between encryption equipment three.Wherein, terminal to be certified can be with For engine end, intelligent door lock etc., all can access the terminal device that in Internet of Things and available intelligent terminal is controlled.It is upper Machine can be intelligent terminal (such as mobile phone, intelligent wearable device, tablet computer or computer).The present embodiment will be with terminal to be certified To be illustrated for engine end.Data authentication method provided in this embodiment is applied to encryption equipment, specifically includes following behaviour Make:
S210, identification authentication data is generated.
Encryption equipment can generate identification authentication data according to the permissions data received.Specifically, encryption equipment is obtaining permission After data, preset calculating can be carried out to the permissions data, and according to calculated value and permissions data, is generated identity and recognized Demonstrate,prove data
S220, the identification authentication data is sent to terminal to be certified.
Identification authentication data can be sent to terminal to be certified by host computer by encryption equipment.
S230, identity authentication result is received.
Encryption equipment can also receive host computer when receiving the identity authentication result that terminal to be certified is sent by host computer Data needed for the session authentication of transmission.Data needed for the session authentication include unique code, the host computer of permissions data, end to be certified Identity information etc..
S240, session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated.
The generation session authentication data, comprising: according to data needed for the identity authentication result and session authentication, generate Session authentication data.
S250, session authentication result is received.
After receiving the session authentication result, further includes: generate session control data, and session control data are sent out It send to terminal to be certified.
Wherein, the generation session control data, specifically include: according to needed for the session authentication result and session control Data generate the session control data;Wherein, data needed for the session control are sent to the encryption by the host computer Machine.
The embodiment of the present invention generates identification authentication data and session authentication data by encryption equipment, due to the safety of encryption equipment Coefficient is high, so as to improve the safety and accuracy of data authentication.
Embodiment three
Fig. 4 is a kind of structural block diagram for data authentication device that the embodiment of the present invention three provides.The device is for executing A kind of data authentication method of the offer of embodiment one is provided.The device is configured at terminal to be certified, comprising:
Receiving module 310, for receiving the data to be certified generated by encryption equipment;
Authentication module 320 after verification passes through, generates identity for verifying to the data to be certified Authentication result, and the identity authentication result is sent to encryption equipment;
Session authentication module 330, for receiving the session authentication data of encryption equipment transmission, according to the session authentication data Conversate certification, and session authentication result is sent to encryption equipment.
Wherein, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the receiving module, is specifically used for:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein The identification authentication data is generated by the encryption equipment according to the permissions data.
Further, the authentication module, is specifically used for:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and by data needed for session authentication and the identity authentication result It is sent to encryption equipment, jointly to request the session authentication data.
Further, device further include: session control data reception module is used for: being sent by session authentication result To encryption equipment, the session control data that encryption equipment is sent are received;
The session control data are executed, and implementing result is sent to encryption equipment.
The data authentication device that the embodiment of the present invention three provides, improves the efficiency of data authentication, guarantees the peace of data authentication Entirely, the accuracy of data authentication is improved.
Data authentication provided by the embodiment of the present invention one can be performed in data authentication device provided by the embodiment of the present invention Method has the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 5 is a kind of structural block diagram for data authentication device that the embodiment of the present invention four provides.The device is for executing A kind of data authentication method of the offer of any embodiment two is provided.The device is configured at encryption equipment, comprising:
Generation module 410, for generating identification authentication data;
Sending module 420, for the identification authentication data to be sent to terminal to be certified;
First receiving module 430, for receiving identity authentication result;
The session authentication data is sent to by session authentication data sending module 440 for generating session authentication data Terminal to be certified is authenticated;
Second receiving module 450, for receiving session authentication result.
Wherein, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the generation module, is specifically used for:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to described add by the host computer Close machine.
Further, first receiving module, is specifically used for:
The host computer receives the identity authentication result that the terminal to be certified is sent, and will count needed for session authentication According to and the identity authentication result be sent to encryption equipment jointly.
Further, the session authentication data sending module, is specifically used for:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
Further, the device further include: session control data generation module, for receiving the session authentication result Later, session control data are generated, and session control data are sent to terminal to be certified.
Further, the session control data generation module, is specifically used for:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, described Data needed for session control are sent to the encryption equipment by the host computer.
The data authentication device that the embodiment of the present invention four provides, improves the efficiency of data authentication, guarantees the peace of data authentication Entirely, the accuracy of data authentication is improved.
Data authentication provided by the embodiment of the present invention two can be performed in data authentication device provided by the embodiment of the present invention Method has the corresponding functional module of execution method and beneficial effect.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (14)

1. a kind of data authentication method, which is characterized in that be applied to terminal to be certified, comprising:
Receive the identification authentication data generated by encryption equipment;
The identification authentication data is verified, after verification passes through, generates identity authentication result, and the identity is recognized Card result is sent to encryption equipment;
The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and session is recognized Card result is sent to encryption equipment.
2. the method according to claim 1, wherein the terminal to be certified passes through host computer and the encryption equipment Communication connection.
3. according to the method described in claim 2, it is characterized in that, receiving the identification authentication data generated by encryption equipment, specifically Include:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein described Identification authentication data is generated by the encryption equipment according to the permissions data.
4. according to the method described in claim 2, it is characterized in that, the identity authentication result is sent to encryption equipment, specifically Include:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and data needed for session authentication and the identity authentication result are common It is sent to encryption equipment, to request the session authentication data.
5. the method according to claim 1, wherein being gone back after session authentication result is sent to encryption equipment Include:
Receive the session control data that encryption equipment is sent;
The session control data are executed, and implementing result is sent to encryption equipment.
6. a kind of data authentication device, which is characterized in that be configured at terminal to be certified, comprising:
Receiving module, for receiving the data to be certified generated by encryption equipment;
Authentication module after verification passes through, generates authentication knot for verifying to the data to be certified Fruit, and the identity authentication result is sent to encryption equipment;
Session authentication module is understood for receiving the session authentication data of encryption equipment transmission according to the session authentication data Words certification, and session authentication result is sent to encryption equipment.
7. a kind of data authentication method, which is characterized in that be applied to encryption equipment, comprising:
Generate identification authentication data;
The identification authentication data is sent to terminal to be certified;
Receive identity authentication result;
Session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated;
Receive session authentication result.
8. the method according to the description of claim 7 is characterized in that the terminal to be certified passes through host computer and the encryption equipment Communication connection.
9. according to the method described in claim 8, it is characterized in that, the generation identity card data specifically include:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to the encryption by the host computer Machine.
10. according to the method described in claim 8, it is characterized in that, the reception identity authentication result, specifically includes:
Data needed for receiving the identity authentication result and session authentication that the host computer is sent.
11. according to the method described in claim 10, it is characterized in that, the generation session authentication data, comprising:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
12. according to the method described in claim 8, it is characterized in that, after receiving the session authentication result, further includes:
Session control data are generated, and session control data are sent to terminal to be certified.
13. according to the method for claim 12, which is characterized in that the generation session control data specifically include:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, the session Data needed for controlling are sent to the encryption equipment by the host computer.
14. a kind of data authentication device, which is characterized in that be configured at encryption equipment, comprising:
Generation module, for generating identification authentication data;
Sending module, for the identification authentication data to be sent to terminal to be certified;
First receiving module, for receiving identity authentication result;
The session authentication data is sent to be certified by session authentication data sending module for generating session authentication data Terminal is authenticated;
Second receiving module, for receiving session authentication result.
CN201910450095.XA 2019-05-28 2019-05-28 Data authentication method and device Pending CN110166468A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910450095.XA CN110166468A (en) 2019-05-28 2019-05-28 Data authentication method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910450095.XA CN110166468A (en) 2019-05-28 2019-05-28 Data authentication method and device

Publications (1)

Publication Number Publication Date
CN110166468A true CN110166468A (en) 2019-08-23

Family

ID=67629528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910450095.XA Pending CN110166468A (en) 2019-05-28 2019-05-28 Data authentication method and device

Country Status (1)

Country Link
CN (1) CN110166468A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008136764A1 (en) * 2007-05-03 2008-11-13 Ezypay Pte Ltd System and method for secured data transfer over a network from a mobile device
US20120159147A1 (en) * 2010-12-21 2012-06-21 Massachusetts Institute Of Technology Secret key generation
CN103001771A (en) * 2012-11-14 2013-03-27 广东电网公司电力科学研究院 Data transmission security encryption method for metering automation system
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
CA2938824A1 (en) * 2014-02-11 2015-08-20 Einnovations Holdings Pte. Ltd. Authentication system and method
US9485091B2 (en) * 2014-05-01 2016-11-01 International Business Machines Corporation Dual-party session key derivation
CN106656999A (en) * 2016-11-10 2017-05-10 济南浪潮高新科技投资发展有限公司 Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment
CN106713279A (en) * 2016-11-29 2017-05-24 北京航天爱威电子技术有限公司 Video terminal identity authentication system
WO2017165828A1 (en) * 2016-03-25 2017-09-28 T-Central, Inc. System and method for internet of things (iot) security and management
CN107566314A (en) * 2016-06-30 2018-01-09 阿里巴巴集团控股有限公司 A kind of data transmission system, method and apparatus
CN108449322A (en) * 2018-02-13 2018-08-24 环球鑫彩(北京)彩票投资管理有限公司 Identity registration, authentication method, system and relevant device
CN108599946A (en) * 2018-06-22 2018-09-28 深圳合纵富科技有限公司 A kind of safe encryption method and camera system based on camera system
US20180302227A1 (en) * 2015-04-30 2018-10-18 Bundesdruckerei Gmbh Method for generating an electronic signature
CN108734016A (en) * 2018-04-17 2018-11-02 新大陆(福建)公共服务有限公司 A kind of access method and computer equipment of Data Persistence Layer
CN108848107A (en) * 2018-07-04 2018-11-20 成都立鑫新技术科技有限公司 A kind of method of secure transmission web information
CN109726583A (en) * 2018-12-12 2019-05-07 西安得安信息技术有限公司 Cloud data base encryption server system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008136764A1 (en) * 2007-05-03 2008-11-13 Ezypay Pte Ltd System and method for secured data transfer over a network from a mobile device
US20120159147A1 (en) * 2010-12-21 2012-06-21 Massachusetts Institute Of Technology Secret key generation
CN103001771A (en) * 2012-11-14 2013-03-27 广东电网公司电力科学研究院 Data transmission security encryption method for metering automation system
CA2938824A1 (en) * 2014-02-11 2015-08-20 Einnovations Holdings Pte. Ltd. Authentication system and method
US9485091B2 (en) * 2014-05-01 2016-11-01 International Business Machines Corporation Dual-party session key derivation
CN104182676A (en) * 2014-09-04 2014-12-03 北京邮电大学 Intelligent terminal data encryption method and device
US20180302227A1 (en) * 2015-04-30 2018-10-18 Bundesdruckerei Gmbh Method for generating an electronic signature
WO2017165828A1 (en) * 2016-03-25 2017-09-28 T-Central, Inc. System and method for internet of things (iot) security and management
CN107566314A (en) * 2016-06-30 2018-01-09 阿里巴巴集团控股有限公司 A kind of data transmission system, method and apparatus
CN106656999A (en) * 2016-11-10 2017-05-10 济南浪潮高新科技投资发展有限公司 Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment
CN106713279A (en) * 2016-11-29 2017-05-24 北京航天爱威电子技术有限公司 Video terminal identity authentication system
CN108449322A (en) * 2018-02-13 2018-08-24 环球鑫彩(北京)彩票投资管理有限公司 Identity registration, authentication method, system and relevant device
CN108734016A (en) * 2018-04-17 2018-11-02 新大陆(福建)公共服务有限公司 A kind of access method and computer equipment of Data Persistence Layer
CN108599946A (en) * 2018-06-22 2018-09-28 深圳合纵富科技有限公司 A kind of safe encryption method and camera system based on camera system
CN108848107A (en) * 2018-07-04 2018-11-20 成都立鑫新技术科技有限公司 A kind of method of secure transmission web information
CN109726583A (en) * 2018-12-12 2019-05-07 西安得安信息技术有限公司 Cloud data base encryption server system

Similar Documents

Publication Publication Date Title
US10601801B2 (en) Identity authentication method and apparatus
CN111143890B (en) Calculation processing method, device, equipment and medium based on block chain
CN110380852B (en) Bidirectional authentication method and communication system
CN111028397B (en) Authentication method and device, and vehicle control method and device
CN105850073B (en) Information system access authentication method and device
CN109862040A (en) A kind of safety certifying method and Verification System
US11501294B2 (en) Method and device for providing and obtaining graphic code information, and terminal
CN107040513B (en) Trusted access authentication processing method, user terminal and server
EP3319292A1 (en) Method for checking security based on biological features, client and server
CN109040149A (en) Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN111431719A (en) Mobile terminal password protection module, mobile terminal and password protection method
CN109039628A (en) Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN104065653A (en) Interactive authentication method, device, system and related equipment
JP2018504789A (en) Payment authentication system, method and apparatus
CN106209734B (en) The identity identifying method and device of process
EP3206329B1 (en) Security check method, device, terminal and server
CN105391734A (en) Secure login system, secure login method, login server and authentication server
CN104660412A (en) Password-less security authentication method and system for mobile equipment
CN106850207A (en) Identity identifying method and system without CA
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN106330838A (en) Dynamic signature method, client using the same and server
CN112968971A (en) Method and device for establishing session connection, electronic equipment and readable storage medium
CN110838919B (en) Communication method, storage method, operation method and device
CN113132087A (en) Internet of things, identity authentication and secret communication method, chip, equipment and medium
CN117336092A (en) Client login method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823