CN110166468A - Data authentication method and device - Google Patents
Data authentication method and device Download PDFInfo
- Publication number
- CN110166468A CN110166468A CN201910450095.XA CN201910450095A CN110166468A CN 110166468 A CN110166468 A CN 110166468A CN 201910450095 A CN201910450095 A CN 201910450095A CN 110166468 A CN110166468 A CN 110166468A
- Authority
- CN
- China
- Prior art keywords
- data
- authentication
- session
- encryption equipment
- sent
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
Abstract
The embodiment of the invention discloses a kind of data authentication method and devices.This method is applied to terminal to be certified, comprising: receives the identification authentication data generated by encryption equipment;The identification authentication data is verified, after verification passes through, generates identity authentication result, and the identity authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and session authentication result is sent to encryption equipment.Identification authentication data and session authentication data are generated by encryption equipment, since the safety coefficient of encryption equipment is high, for the embodiment of the present invention so as to improve the safety and accuracy of data authentication, terminal to be certified authenticates identity data and session authentication data, improves authentication efficiency.
Description
Technical field
The present embodiments relate to authentication techniques more particularly to a kind of data authentication methods and device.
Background technique
The method of data authentication is widely used in every field, during certification, cloud is needed to be authenticated.Wait recognize
Card terminal gets the data of terminal to be used, and terminal to be certified is by the data of terminal to be used and terminal own identification to be certified
Data are sent to cloud and carry out data authentication, and cloud carries out data authentication, determines that terminal to be certified treats whether using terminal has
Access right.However, data are easily revealed, and safety is poor since cloud is vulnerable to attack, certification inaccuracy.
Summary of the invention
The embodiment of the present invention provides a kind of data authentication method and device, solves currently employed cloud and carries out data authentication
Method, since cloud is vulnerable to attack, safety is poor, leads to the problem of certification inaccuracy.
In a first aspect, this method is applied to terminal to be certified the embodiment of the invention provides a kind of data authentication method, it should
Method includes:
Receive the identification authentication data generated by encryption equipment;
The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the body
Part authentication result is sent to encryption equipment;
The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and will
Words authentication result is sent to encryption equipment.
Further, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the identification authentication data generated by encryption equipment is received, is specifically included:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein
The identification authentication data is generated by the encryption equipment according to the permissions data.
Further, the identity authentication result is sent to encryption equipment, specifically included:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and by data needed for session authentication and the identity authentication result
It is sent to encryption equipment, jointly to request the session authentication data.
Further, after session authentication result is sent to encryption equipment, further includes:
Receive the session control data that encryption equipment is sent;
The session control data are executed, and implementing result is sent to encryption equipment.
Second aspect, the embodiment of the invention also provides a kind of data authentication device, which is configured at terminal to be certified,
Include:
Receiving module, for receiving the data to be certified generated by encryption equipment;
Authentication module after verification passes through, generates authentication for verifying to the data to be certified
As a result, and the identity authentication result is sent to encryption equipment;
Session authentication module, for receive encryption equipment transmission session authentication data, according to the session authentication data into
Row session authentication, and session authentication result is sent to encryption equipment.
The third aspect, the embodiment of the invention also provides a kind of data authentication method, this method is applied to encryption equipment, packet
It includes:
Generate identification authentication data;
The identification authentication data is sent to terminal to be certified;
Receive identity authentication result;
Session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated;
Receive session authentication result.
Further, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the generation identity card data specifically include:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to described add by the host computer
Close machine.
Further, the reception identity authentication result, specifically includes:
Data needed for receiving the identity authentication result and session authentication that the host computer is sent.
Further, the generation session authentication data, comprising:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
Further, after receiving the session authentication result, further includes:
Session control data are generated, and session control data are sent to terminal to be certified.
Further, the generation session control data, specifically include:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, described
Data needed for session control are sent to the encryption equipment by the host computer.
Fourth aspect, the embodiment of the invention also provides a kind of data authentication device, which is configured at encryption equipment, packet
It includes:
Generation module, for generating identification authentication data;
Sending module, for the identification authentication data to be sent to terminal to be certified;
First receiving module, for receiving identity authentication result;
Session authentication data sending module, for generating session authentication data, by the session authentication data be sent to
Certification terminal is authenticated;
Second receiving module, for receiving session authentication result.
Method provided in an embodiment of the present invention is applied to terminal to be certified, by receiving the authentication generated by encryption equipment
Data;The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the identity
Authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is understood according to the session authentication data
Words certification, and session authentication result is sent to encryption equipment, identification authentication data and session authentication data are generated by encryption equipment,
Since the safety coefficient of encryption equipment is high, so as to improve the safety and accuracy of data authentication, terminal to be certified is to identity
Data and session authentication data are authenticated, and authentication efficiency is improved.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing does one and simply introduces, it should be apparent that, drawings in the following description are some embodiments of the invention, for this
For the those of ordinary skill of field, without creative efforts, it can also be obtained according to these attached drawings others
Attached drawing.
Fig. 1 is a kind of flow diagram for data authentication method that the embodiment of the present invention one provides;
Fig. 2 is a kind of interaction flow schematic diagram for data authentication that the embodiment of the present invention one provides;
Fig. 3 is a kind of flow diagram of data authentication method provided by Embodiment 2 of the present invention;
Fig. 4 is a kind of structural schematic diagram for data authentication device that the embodiment of the present invention three provides;
Fig. 5 is a kind of structural schematic diagram for data authentication device that the embodiment of the present invention four provides;
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, hereinafter with reference to attached in the embodiment of the present invention
Figure, clearly and completely describes technical solution of the present invention by embodiment, it is clear that described embodiment is the present invention one
Section Example, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
Embodiment one
Fig. 1 is a kind of flow chart for data authentication method that the embodiment of the present invention one provides, and Fig. 2 is the embodiment of the present invention one
The interaction schematic diagram of the data authentication method of offer.The technical solution of the present embodiment can be adapted for terminal to be certified, host computer,
Data authentication process between encryption equipment three.Wherein, terminal to be certified all can connect for engine end, intelligent door lock etc.
Enter the terminal device that in Internet of Things and available intelligent terminal is controlled.Host computer can be intelligent terminal (such as mobile phone, intelligence
Wearable device, tablet computer or computer etc.).The present embodiment will be illustrated so that terminal to be certified is engine end as an example, but ability
Field technique personnel are appreciated that all terminal devices that can be controlled with intelligent terminal, all can serve as terminal to be certified, this reality
It is without limitation to apply example.
Data authentication method provided in this embodiment is applied to terminal to be certified, specifically includes following operation:
The identification authentication data that S110, reception are generated by encryption equipment.
In the present embodiment, terminal to be certified can be communicatively coupled by host computer and encryption equipment.It specifically, can be first in vehicle
Communication connection is established between generator terminal and host computer, as Bluetooth communication connects.After establishing communication connection, host computer can be by permissions data
It is sent to encryption equipment, to request identification authentication data, to start identifying procedure.Encryption equipment can be according to the permissions data received
Generate identification authentication data.Specifically, encryption equipment can carry out preset calculating to the permissions data after obtaining permissions data,
And according to calculated value and permissions data, identification authentication data is generated.In practical applications, the preset calculating can be
Signature or other algorithms obtain signature value, and utilize label for example, encryption equipment can do signature operation to permissions data using private key
Name value and permissions data generate identification authentication data.The permissions data may include operating right, Time Validity etc..
After generating identification authentication data, which can be sent to engine end by host computer by encryption equipment.
S120, the identification authentication data is verified, after verification passes through, generates identity authentication result, and will
The identity authentication result is sent to encryption equipment.
Engine end verifies identification authentication data, can also include solving before verification to identification authentication data
It is close, the identification authentication data after decryption is verified.Specifically, when being verified to the identification authentication data after decryption
The correctness and validity of permissions data can be verified.After verification passes through, engine end passes through identity authentication result upper
Machine is sent to encryption equipment.
Host computer can also obtain data needed for session authentication when receiving identity authentication result, and by session authentication institute
Data and the identity authentication result are needed to be sent to encryption equipment jointly, to request the session authentication data.
S130, the session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and
Session authentication result is sent to encryption equipment.
After data needed for encryption equipment receives identity authentication result and session authentication, key data is generated, and utilize key
The data deciphering identity authentication result.Data needed for the session authentication include unique code, the host computer of permissions data, end to be certified
Identity information etc..Encryption equipment data according to needed for the session authentication generate character string, and utilize the key data encryption character
String generates session authentication data.Hereafter, the session authentication data etc. is sent to host computer by encryption equipment jointly.Host computer will
Words authentication data is sent to engine end.
Engine end receive session authentication data after, decrypted session authentication data, and to the session authentication data after decryption into
Row verification obtains session authentication result after verification passes through.Then encryption equipment will be sent to after the encryption of session authentication result.It is upper
Machine receive engine end send session authentication as a result, and obtain data needed for session control, then by the session authentication result with
Data needed for the session control are sent to encryption equipment jointly.
Further, host computer is after being sent to encryption equipment for session authentication result, further includes: receives encryption equipment and sends
Session control data;The session control data are executed, and implementing result is sent to encryption equipment.
After encryption equipment data needed for receiving session authentication result and session control, first computation key data, with decryption
The session authentication result.Data needed for the session control may include permissions data, unique code of engine end, original control instruction number
According to etc..Data needed for encryption equipment utilizes the session control generate session control data.
After generating session control data, the data such as session control are sent to together host computer by encryption equipment altogether.Host computer will
Words control data are sent to engine end.Engine end executes session control data, and returns to implementing result to encryption by host computer
Machine.
Last encryption equipment and end to be certified generate session key through consultation, and decrypt the execution knot using the session key
Fruit.Hereafter, the implementing result after decryption can be fed back to host computer by encryption equipment.
Method provided in an embodiment of the present invention is applied to terminal to be certified, by receiving the authentication generated by encryption equipment
Data;The identification authentication data is verified, after verification passes through, generates identity authentication result, and by the identity
Authentication result is sent to encryption equipment;The session authentication data that encryption equipment is sent is received, is understood according to the session authentication data
Words certification, and session authentication result is sent to encryption equipment, identification authentication data and session authentication data are generated by encryption equipment,
Since the safety coefficient of encryption equipment is high, so as to improve the safety and accuracy of data authentication, terminal to be certified is to identity
Data and session authentication data are authenticated, and authentication efficiency is improved.
Embodiment two
Fig. 3 is a kind of flow chart of data authentication method provided by Embodiment 2 of the present invention.The technical solution of the present embodiment
It can be adapted for terminal to be certified, host computer, the data authentication process between encryption equipment three.Wherein, terminal to be certified can be with
For engine end, intelligent door lock etc., all can access the terminal device that in Internet of Things and available intelligent terminal is controlled.It is upper
Machine can be intelligent terminal (such as mobile phone, intelligent wearable device, tablet computer or computer).The present embodiment will be with terminal to be certified
To be illustrated for engine end.Data authentication method provided in this embodiment is applied to encryption equipment, specifically includes following behaviour
Make:
S210, identification authentication data is generated.
Encryption equipment can generate identification authentication data according to the permissions data received.Specifically, encryption equipment is obtaining permission
After data, preset calculating can be carried out to the permissions data, and according to calculated value and permissions data, is generated identity and recognized
Demonstrate,prove data
S220, the identification authentication data is sent to terminal to be certified.
Identification authentication data can be sent to terminal to be certified by host computer by encryption equipment.
S230, identity authentication result is received.
Encryption equipment can also receive host computer when receiving the identity authentication result that terminal to be certified is sent by host computer
Data needed for the session authentication of transmission.Data needed for the session authentication include unique code, the host computer of permissions data, end to be certified
Identity information etc..
S240, session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated.
The generation session authentication data, comprising: according to data needed for the identity authentication result and session authentication, generate
Session authentication data.
S250, session authentication result is received.
After receiving the session authentication result, further includes: generate session control data, and session control data are sent out
It send to terminal to be certified.
Wherein, the generation session control data, specifically include: according to needed for the session authentication result and session control
Data generate the session control data;Wherein, data needed for the session control are sent to the encryption by the host computer
Machine.
The embodiment of the present invention generates identification authentication data and session authentication data by encryption equipment, due to the safety of encryption equipment
Coefficient is high, so as to improve the safety and accuracy of data authentication.
Embodiment three
Fig. 4 is a kind of structural block diagram for data authentication device that the embodiment of the present invention three provides.The device is for executing
A kind of data authentication method of the offer of embodiment one is provided.The device is configured at terminal to be certified, comprising:
Receiving module 310, for receiving the data to be certified generated by encryption equipment;
Authentication module 320 after verification passes through, generates identity for verifying to the data to be certified
Authentication result, and the identity authentication result is sent to encryption equipment;
Session authentication module 330, for receiving the session authentication data of encryption equipment transmission, according to the session authentication data
Conversate certification, and session authentication result is sent to encryption equipment.
Wherein, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the receiving module, is specifically used for:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein
The identification authentication data is generated by the encryption equipment according to the permissions data.
Further, the authentication module, is specifically used for:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and by data needed for session authentication and the identity authentication result
It is sent to encryption equipment, jointly to request the session authentication data.
Further, device further include: session control data reception module is used for: being sent by session authentication result
To encryption equipment, the session control data that encryption equipment is sent are received;
The session control data are executed, and implementing result is sent to encryption equipment.
The data authentication device that the embodiment of the present invention three provides, improves the efficiency of data authentication, guarantees the peace of data authentication
Entirely, the accuracy of data authentication is improved.
Data authentication provided by the embodiment of the present invention one can be performed in data authentication device provided by the embodiment of the present invention
Method has the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 5 is a kind of structural block diagram for data authentication device that the embodiment of the present invention four provides.The device is for executing
A kind of data authentication method of the offer of any embodiment two is provided.The device is configured at encryption equipment, comprising:
Generation module 410, for generating identification authentication data;
Sending module 420, for the identification authentication data to be sent to terminal to be certified;
First receiving module 430, for receiving identity authentication result;
The session authentication data is sent to by session authentication data sending module 440 for generating session authentication data
Terminal to be certified is authenticated;
Second receiving module 450, for receiving session authentication result.
Wherein, the terminal to be certified is communicated to connect by host computer and the encryption equipment.
Further, the generation module, is specifically used for:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to described add by the host computer
Close machine.
Further, first receiving module, is specifically used for:
The host computer receives the identity authentication result that the terminal to be certified is sent, and will count needed for session authentication
According to and the identity authentication result be sent to encryption equipment jointly.
Further, the session authentication data sending module, is specifically used for:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
Further, the device further include: session control data generation module, for receiving the session authentication result
Later, session control data are generated, and session control data are sent to terminal to be certified.
Further, the session control data generation module, is specifically used for:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, described
Data needed for session control are sent to the encryption equipment by the host computer.
The data authentication device that the embodiment of the present invention four provides, improves the efficiency of data authentication, guarantees the peace of data authentication
Entirely, the accuracy of data authentication is improved.
Data authentication provided by the embodiment of the present invention two can be performed in data authentication device provided by the embodiment of the present invention
Method has the corresponding functional module of execution method and beneficial effect.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (14)
1. a kind of data authentication method, which is characterized in that be applied to terminal to be certified, comprising:
Receive the identification authentication data generated by encryption equipment;
The identification authentication data is verified, after verification passes through, generates identity authentication result, and the identity is recognized
Card result is sent to encryption equipment;
The session authentication data that encryption equipment is sent is received, is conversated certification according to the session authentication data, and session is recognized
Card result is sent to encryption equipment.
2. the method according to claim 1, wherein the terminal to be certified passes through host computer and the encryption equipment
Communication connection.
3. according to the method described in claim 2, it is characterized in that, receiving the identification authentication data generated by encryption equipment, specifically
Include:
The host computer is to the encryption equipment sending permission data, to request the identification authentication data;
The terminal to be certified receives the identification authentication data that the encryption equipment is sent by the host computer, wherein described
Identification authentication data is generated by the encryption equipment according to the permissions data.
4. according to the method described in claim 2, it is characterized in that, the identity authentication result is sent to encryption equipment, specifically
Include:
The identity authentication result is sent to the host computer by the terminal to be certified;
The host computer receives the identity authentication result, and data needed for session authentication and the identity authentication result are common
It is sent to encryption equipment, to request the session authentication data.
5. the method according to claim 1, wherein being gone back after session authentication result is sent to encryption equipment
Include:
Receive the session control data that encryption equipment is sent;
The session control data are executed, and implementing result is sent to encryption equipment.
6. a kind of data authentication device, which is characterized in that be configured at terminal to be certified, comprising:
Receiving module, for receiving the data to be certified generated by encryption equipment;
Authentication module after verification passes through, generates authentication knot for verifying to the data to be certified
Fruit, and the identity authentication result is sent to encryption equipment;
Session authentication module is understood for receiving the session authentication data of encryption equipment transmission according to the session authentication data
Words certification, and session authentication result is sent to encryption equipment.
7. a kind of data authentication method, which is characterized in that be applied to encryption equipment, comprising:
Generate identification authentication data;
The identification authentication data is sent to terminal to be certified;
Receive identity authentication result;
Session authentication data is generated, the session authentication data is sent to terminal to be certified and is authenticated;
Receive session authentication result.
8. the method according to the description of claim 7 is characterized in that the terminal to be certified passes through host computer and the encryption equipment
Communication connection.
9. according to the method described in claim 8, it is characterized in that, the generation identity card data specifically include:
Identification authentication data is generated according to permissions data;Wherein the permissions data is sent to the encryption by the host computer
Machine.
10. according to the method described in claim 8, it is characterized in that, the reception identity authentication result, specifically includes:
Data needed for receiving the identity authentication result and session authentication that the host computer is sent.
11. according to the method described in claim 10, it is characterized in that, the generation session authentication data, comprising:
According to data needed for the identity authentication result and session authentication, session authentication data is generated.
12. according to the method described in claim 8, it is characterized in that, after receiving the session authentication result, further includes:
Session control data are generated, and session control data are sent to terminal to be certified.
13. according to the method for claim 12, which is characterized in that the generation session control data specifically include:
According to data needed for the session authentication result and session control, the session control data are generated;Wherein, the session
Data needed for controlling are sent to the encryption equipment by the host computer.
14. a kind of data authentication device, which is characterized in that be configured at encryption equipment, comprising:
Generation module, for generating identification authentication data;
Sending module, for the identification authentication data to be sent to terminal to be certified;
First receiving module, for receiving identity authentication result;
The session authentication data is sent to be certified by session authentication data sending module for generating session authentication data
Terminal is authenticated;
Second receiving module, for receiving session authentication result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910450095.XA CN110166468A (en) | 2019-05-28 | 2019-05-28 | Data authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910450095.XA CN110166468A (en) | 2019-05-28 | 2019-05-28 | Data authentication method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110166468A true CN110166468A (en) | 2019-08-23 |
Family
ID=67629528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910450095.XA Pending CN110166468A (en) | 2019-05-28 | 2019-05-28 | Data authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110166468A (en) |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008136764A1 (en) * | 2007-05-03 | 2008-11-13 | Ezypay Pte Ltd | System and method for secured data transfer over a network from a mobile device |
US20120159147A1 (en) * | 2010-12-21 | 2012-06-21 | Massachusetts Institute Of Technology | Secret key generation |
CN103001771A (en) * | 2012-11-14 | 2013-03-27 | 广东电网公司电力科学研究院 | Data transmission security encryption method for metering automation system |
CN104182676A (en) * | 2014-09-04 | 2014-12-03 | 北京邮电大学 | Intelligent terminal data encryption method and device |
CA2938824A1 (en) * | 2014-02-11 | 2015-08-20 | Einnovations Holdings Pte. Ltd. | Authentication system and method |
US9485091B2 (en) * | 2014-05-01 | 2016-11-01 | International Business Machines Corporation | Dual-party session key derivation |
CN106656999A (en) * | 2016-11-10 | 2017-05-10 | 济南浪潮高新科技投资发展有限公司 | Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment |
CN106713279A (en) * | 2016-11-29 | 2017-05-24 | 北京航天爱威电子技术有限公司 | Video terminal identity authentication system |
WO2017165828A1 (en) * | 2016-03-25 | 2017-09-28 | T-Central, Inc. | System and method for internet of things (iot) security and management |
CN107566314A (en) * | 2016-06-30 | 2018-01-09 | 阿里巴巴集团控股有限公司 | A kind of data transmission system, method and apparatus |
CN108449322A (en) * | 2018-02-13 | 2018-08-24 | 环球鑫彩(北京)彩票投资管理有限公司 | Identity registration, authentication method, system and relevant device |
CN108599946A (en) * | 2018-06-22 | 2018-09-28 | 深圳合纵富科技有限公司 | A kind of safe encryption method and camera system based on camera system |
US20180302227A1 (en) * | 2015-04-30 | 2018-10-18 | Bundesdruckerei Gmbh | Method for generating an electronic signature |
CN108734016A (en) * | 2018-04-17 | 2018-11-02 | 新大陆(福建)公共服务有限公司 | A kind of access method and computer equipment of Data Persistence Layer |
CN108848107A (en) * | 2018-07-04 | 2018-11-20 | 成都立鑫新技术科技有限公司 | A kind of method of secure transmission web information |
CN109726583A (en) * | 2018-12-12 | 2019-05-07 | 西安得安信息技术有限公司 | Cloud data base encryption server system |
-
2019
- 2019-05-28 CN CN201910450095.XA patent/CN110166468A/en active Pending
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008136764A1 (en) * | 2007-05-03 | 2008-11-13 | Ezypay Pte Ltd | System and method for secured data transfer over a network from a mobile device |
US20120159147A1 (en) * | 2010-12-21 | 2012-06-21 | Massachusetts Institute Of Technology | Secret key generation |
CN103001771A (en) * | 2012-11-14 | 2013-03-27 | 广东电网公司电力科学研究院 | Data transmission security encryption method for metering automation system |
CA2938824A1 (en) * | 2014-02-11 | 2015-08-20 | Einnovations Holdings Pte. Ltd. | Authentication system and method |
US9485091B2 (en) * | 2014-05-01 | 2016-11-01 | International Business Machines Corporation | Dual-party session key derivation |
CN104182676A (en) * | 2014-09-04 | 2014-12-03 | 北京邮电大学 | Intelligent terminal data encryption method and device |
US20180302227A1 (en) * | 2015-04-30 | 2018-10-18 | Bundesdruckerei Gmbh | Method for generating an electronic signature |
WO2017165828A1 (en) * | 2016-03-25 | 2017-09-28 | T-Central, Inc. | System and method for internet of things (iot) security and management |
CN107566314A (en) * | 2016-06-30 | 2018-01-09 | 阿里巴巴集团控股有限公司 | A kind of data transmission system, method and apparatus |
CN106656999A (en) * | 2016-11-10 | 2017-05-10 | 济南浪潮高新科技投资发展有限公司 | Secure transmission authentication method and device of IoT (Internet of Things) terminal equipment |
CN106713279A (en) * | 2016-11-29 | 2017-05-24 | 北京航天爱威电子技术有限公司 | Video terminal identity authentication system |
CN108449322A (en) * | 2018-02-13 | 2018-08-24 | 环球鑫彩(北京)彩票投资管理有限公司 | Identity registration, authentication method, system and relevant device |
CN108734016A (en) * | 2018-04-17 | 2018-11-02 | 新大陆(福建)公共服务有限公司 | A kind of access method and computer equipment of Data Persistence Layer |
CN108599946A (en) * | 2018-06-22 | 2018-09-28 | 深圳合纵富科技有限公司 | A kind of safe encryption method and camera system based on camera system |
CN108848107A (en) * | 2018-07-04 | 2018-11-20 | 成都立鑫新技术科技有限公司 | A kind of method of secure transmission web information |
CN109726583A (en) * | 2018-12-12 | 2019-05-07 | 西安得安信息技术有限公司 | Cloud data base encryption server system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601801B2 (en) | Identity authentication method and apparatus | |
CN111143890B (en) | Calculation processing method, device, equipment and medium based on block chain | |
CN110380852B (en) | Bidirectional authentication method and communication system | |
CN111028397B (en) | Authentication method and device, and vehicle control method and device | |
CN105850073B (en) | Information system access authentication method and device | |
CN109862040A (en) | A kind of safety certifying method and Verification System | |
US11501294B2 (en) | Method and device for providing and obtaining graphic code information, and terminal | |
CN107040513B (en) | Trusted access authentication processing method, user terminal and server | |
EP3319292A1 (en) | Method for checking security based on biological features, client and server | |
CN109040149A (en) | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system | |
CN111431719A (en) | Mobile terminal password protection module, mobile terminal and password protection method | |
CN109039628A (en) | Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system | |
CN104065653A (en) | Interactive authentication method, device, system and related equipment | |
JP2018504789A (en) | Payment authentication system, method and apparatus | |
CN106209734B (en) | The identity identifying method and device of process | |
EP3206329B1 (en) | Security check method, device, terminal and server | |
CN105391734A (en) | Secure login system, secure login method, login server and authentication server | |
CN104660412A (en) | Password-less security authentication method and system for mobile equipment | |
CN106850207A (en) | Identity identifying method and system without CA | |
CN109361508A (en) | Data transmission method, electronic equipment and computer readable storage medium | |
CN106330838A (en) | Dynamic signature method, client using the same and server | |
CN112968971A (en) | Method and device for establishing session connection, electronic equipment and readable storage medium | |
CN110838919B (en) | Communication method, storage method, operation method and device | |
CN113132087A (en) | Internet of things, identity authentication and secret communication method, chip, equipment and medium | |
CN117336092A (en) | Client login method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190823 |