CN110740116A - multi-application identity authentication system and method - Google Patents
multi-application identity authentication system and method Download PDFInfo
- Publication number
- CN110740116A CN110740116A CN201810808854.0A CN201810808854A CN110740116A CN 110740116 A CN110740116 A CN 110740116A CN 201810808854 A CN201810808854 A CN 201810808854A CN 110740116 A CN110740116 A CN 110740116A
- Authority
- CN
- China
- Prior art keywords
- client
- public key
- application
- service center
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer And Data Communications (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides multi-application identity authentication system and method, the system comprises a client, an application end and an agent service center, the client establishes connection with the application end through the agent service center, the client and the agent service center respectively generate a public key and a private key pair, the client receives an agent public key sent by the agent service center, the client requests to log in a certain application end, encrypts an information packet by using the agent public key and sends the information packet to the agent service center, the agent service center decrypts the information packet by using the agent private key and sends the client public key to a corresponding application end, the application end verifies the client public key and returns authorization information to the client through the agent service center according to a verification result.
Description
Technical Field
The invention belongs to the field of communication, and particularly relates to multi-application identity authentication systems and methods.
Background
In the prior art, different applications and different software have different user systems respectively. When a user logs in, a user name and a password need to be input every time, and the process is complicated; moreover, for users who adopt different passwords for logging in different applications, a plurality of user names and passwords need to be memorized, and the user names and the passwords are easy to be confused or forgotten; in addition, the risk of password stealing easily occurs by inputting for many times, and the security is lower.
Disclosure of Invention
In order to overcome the problems in the prior art, the invention provides kinds of multi-application user identity authentication systems and methods for establishing a corresponding relationship between a user client secret key and a user identity at an application end, and the application end acquires the user client secret key through an agent service center so as to verify the user identity and realize login continuous use.
The invention provides the following technical scheme:
A multi-application identity authentication system comprises a client, an application end, and a proxy service center, wherein the client establishes connection with the application end through the proxy service center.
, the proxy service center includes a proxy key generation module for generating a proxy public key and a private key pair, a proxy key storage module for storing the proxy public key and the private key pair, a control module for communicating with the client and the application according to a preset communication protocol, and an encryption and decryption module for encrypting and decrypting communication data.
, the client comprises a client key generation module for generating a client public key and a client private key pair, a client key storage module for storing the client public key and the client private key pair, a control module for communicating with the agent service center according to the communication protocol, and an encryption and decryption module for encrypting and decrypting communication data.
, the application end includes an account storage module, a control module, and an encryption and decryption module, the account storage module is used for storing the corresponding relationship between the client public key and the account information, the control module is used for communicating with the agent service center according to the communication protocol and for inquiring and checking the client public key, and the encryption and decryption module is used for encrypting and decrypting the communication data.
method for identity authentication by using multi-application identity authentication system, comprising the following steps:
step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client;
step two, the client receives an agent public key sent by an agent service center;
thirdly, the client requests to log in a certain application end, encrypts an information packet containing a client public key and application end information by adopting an agent public key and sends the information packet to an agent service center;
the agent service center decrypts the information packet by adopting an agent private key and sends the client public key to a corresponding application end;
and fifthly, the application side verifies the public key of the client side and returns the authorization information to the client side through the proxy service center according to the verification result.
, in step three, the information package further includes timestamp data and a signature formed by encrypting the timestamp with the client private key.
, in step four, the proxy service center decrypts the signature with the client public key, verifies the timestamp data in the corresponding information packet, and sends the client public key to the corresponding application terminal if the verification is passed.
If the client logs in the application end for the first time and the application end has no client public key record, the application end fails to verify the client public key, the application end returns an authorization address to the proxy service center, and the proxy service center adopts the client public key to encrypt the authorization address and sends the authorization address to the client; the client side adopts a client side private key to decrypt and obtain an authorized address, inputs account information, and realizes the login of the client side to the application side after the verification of the application side is passed; and the application end stores the corresponding relation between the client public key and the account information.
If the client does not log in the application for the first time and the application stores the client public key, in the fifth step, the application successfully verifies the client public key, generates an authorized address path AAP (address Association) and sends the address path AAP to an agent service center, and the agent service center encrypts the AAP by using the client public key and sends the client public key to the client; the client side adopts the private key of the client side to decrypt and obtain the AAP, and the login of the application side is completed.
, in step four, the agent service center uses agent private key to encrypt the client public key and sends it to the application end, in step five, the application end uses agent public key to decrypt and verify the client public key, and uses agent public key to encrypt the authorization information and return it to the agent service center.
Further , the public key and private key generation adopts asymmetric algorithm.
method for identity authentication by multi-application identity authentication system, comprising the following steps:
step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client;
secondly, the client sends a client public key to the proxy service center;
thirdly, the client requests to log in a certain application end, and an information packet containing a client public key and application end information is encrypted by a client private key and sent to an agent service center;
the agent service center decrypts the information packet by adopting the client public key and sends the client public key to a corresponding application end;
and fifthly, the application side verifies the public key of the client side and returns the authorization information to the client side through the proxy service center according to the verification result.
By adopting the technical scheme, the invention has the following beneficial effects:
1. the invention sets standard specifications of the client, the proxy service center and the application terminal through a preset protocol, and designs a safety mechanism, thereby not only simplifying the identity authentication of the client, but also ensuring the safety in the data transmission process;
2. the application end stores the corresponding relation between the client public key and the account information, when the user logs in the application end again, the client automatically sends the client public key information without inputting the account information again, and the application end completes identity authentication through the stored corresponding relation between the client public key and the account information, so that the technical effect of login continuous use is realized, and the burden is reduced for the user;
3. the asymmetric encryption is based on the unique correspondence between the client public key and the private key, the client private key is used for encrypting and signing, the proxy service center adopts the client public key for decryption and carries out identity verification, identity information is difficult to be tampered, and the identity security of a user can be ensured;
4. the asymmetric encryption safety information communication method establishes secret key channels only with between a client side and an agent service center and an application side, and strengthens the safety of information transmission through two safety guarantees of user identity authentication and information decoding.
Drawings
FIG. 1 is a schematic diagram of an identity authentication system according to the present invention;
FIG. 2 is a flow chart of the identity authentication method of the present invention.
Detailed Description
For purposes of making the objects, aspects and advantages of the present invention more apparent, the present invention will be described in detail below with reference to the accompanying drawings and embodiments.
Example 1
The invention provides kinds of multi-application identity authentication system, as shown in figure 1, comprising a client, an application end, and an agent service center, wherein the client establishes connection with the application end through the agent service center.
The agent service center comprises an agent key generation module, an agent key storage module, a control module and an encryption and decryption module. The proxy key generation module is used for generating a proxy public key and a private key pair; the proxy key storage module is used for storing a proxy public key and a private key pair; the control module is used for communicating with the client and the application terminal according to a preset communication protocol; the encryption and decryption module is used for encrypting and decrypting communication data. The proxy service center can be a proxy server or a Software Development Kit (SDK) for realizing the same function.
The client comprises a client key generation module, a client key storage module, a control module and an encryption and decryption module. The client key generation module is used for generating a client public key and a client private key pair; the client key storage module is used for storing a client public key and a client private key pair; the control module is used for communicating with the agent service center according to a communication protocol; the encryption and decryption module is used for encrypting and decrypting communication data.
The application end comprises an account storage module, a control module and an encryption and decryption module. The account storage module is used for storing the corresponding relation between the client public key and the account information; the control module is used for communicating with the agent service center according to a communication protocol and inquiring and checking a client public key; the encryption and decryption module is used for encrypting and decrypting communication data.
The client communicates with the application end through the proxy service center, the key of the client is sent to the application end through the proxy service center, the application end establishes a corresponding relation between the client key and the account information and uses the corresponding relation as the basis of account identity authentication, and therefore the technical effect that the client can log in for continuous use is achieved.
Example 2
The invention provides kinds of multi-application identity authentication methods, as shown in fig. 2, comprising the following steps:
step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client;
step two, the client receives an agent public key sent by an agent service center;
thirdly, the client requests to log in a certain application end, encrypts an information packet containing a client public key and application end information by adopting an agent public key and sends the information packet to an agent service center;
the agent service center decrypts the information packet by adopting an agent private key and sends the client public key to a corresponding application end;
step five, the application side verifies the public key of the client side;
when the client logs in the application end for the first time, the application end has no client public key record, the application end fails to verify the client public key, the application end returns an authorization address to the proxy service center, and the proxy service center adopts the client public key to encrypt the authorization address and sends the authorization address to the client; the client side adopts a client side private key to decrypt and obtain an authorized address, inputs account information, and realizes the login of the client side to the application side after the verification of the application side is passed; and the application end stores the corresponding relation between the client public key and the account information.
When the client logs in the application end for a non-first time, the application end stores the client public key, the application end verifies that the client public key is successful, the application end generates an Authorized Address Path (AAP) and sends the AAP to an agent service center, and the agent service center encrypts the AAP by using the client public key and sends the AAP to the client; the client side adopts the private key of the client side to decrypt and obtain the AAP, and the login of the application side is completed.
In step four, the proxy service center decrypts the signature by using the client public key, verifies the timestamp data in the information packet, and sends the client public key to the corresponding application terminal if the verification is passed, so that the communication security is further improved in step .
The generation of the public key and the private key in the invention can adopt an asymmetric encryption algorithm, such as: the RSA algorithm.
Example 3
The invention provides another kinds of multi-application identity authentication methods, including the following steps:
step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client, and the proxy service center generates a proxy public key and a proxy private key pair, and stores the proxy public key and the proxy private key pair in the proxy service center;
secondly, the client sends a client public key to the proxy service center;
thirdly, the client requests to log in a certain application end, encrypts an information packet containing a client public key and application end information by using a client private key and sends the information packet to an agent service center;
the agent service center decrypts the information packet by adopting the client public key, encrypts the client public key by adopting an agent private key and sends the client public key to the application end;
and in the fifth step, the application terminal decrypts and queries the client public key by using the proxy public key, encrypts the authorization information by using the proxy public key and returns the authorization information to the proxy service center, and the application terminal is allowed to log in.
The above-mentioned embodiments only express the embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (12)
- A multi-application identity authentication system includes a client and an application end, and is characterized in that the system also includes a proxy service center, and the client establishes a connection with the application end through the proxy service center.
- 2. The multi-application identity authentication system of claim 1, wherein the proxy service center comprises a proxy key generation module, a proxy key storage module, a control module, and an encryption and decryption module, wherein the proxy key generation module is configured to generate a proxy public key and a private key pair; the agent key storage module is used for storing an agent public key and a private key pair; the control module is used for communicating with the client and the application terminal according to a preset communication protocol; the encryption and decryption module is used for encrypting and decrypting communication data.
- 3. The multi-application identity authentication system according to claim 2, wherein the client comprises a client key generation module, a client key storage module, a control module, and an encryption and decryption module, and the client key generation module is configured to generate a client public key and a client private key pair; the client key storage module is used for storing a client public key and a client private key pair; the control module is used for communicating with the proxy service center according to the communication protocol; the encryption and decryption module is used for encrypting and decrypting communication data.
- 4. The multi-application identity authentication system according to claim 2, wherein the application terminal comprises an account storage module, a control module, and an encryption/decryption module, and the account storage module is configured to store a correspondence between a client public key and account information; the control module is used for communicating with the proxy service center according to the communication protocol and inquiring and checking a client public key; the encryption and decryption module is used for encrypting and decrypting communication data.
- 5, method for identity authentication by using the multi-application identity authentication system of claim 1, comprising the steps of:step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client;step two, the client receives an agent public key sent by an agent service center;thirdly, the client requests to log in a certain application end, encrypts an information packet containing a client public key and application end information by adopting an agent public key and sends the information packet to an agent service center;the agent service center decrypts the information packet by adopting an agent private key and sends the client public key to a corresponding application end;and fifthly, the application side verifies the public key of the client side and returns the authorization information to the client side through the proxy service center according to the verification result.
- 6. The identity authentication method of claim 5, wherein in step three, the information packet further comprises timestamp data and a signature formed by encrypting the timestamp with a client private key.
- 7. The method of claim 6, wherein in step four, the proxy service center decrypts the signature with the client public key, verifies the timestamp data in the corresponding packet, and sends the client public key to the corresponding application terminal if the verification is passed.
- 8. The method of claim 5, wherein if the client is a first login application and the application has no client public key record, the application fails to verify the client public key, the application returns an authorization address to the proxy service center, and the proxy service center encrypts the authorization address using the client public key and sends the authorization address to the client; the client side adopts a client side private key to decrypt and obtain an authorized address, inputs account information, and realizes the login of the client side to the application side after the verification of the application side is passed; and the application end stores the corresponding relation between the client public key and the account information.
- 9. The method according to claim 5, wherein if the client does not log in the application for the first time and the application has stored the client public key, in step five, the application verifies that the client public key is successful, the application generates an authorized address path AAP and sends the AAP to the proxy service center, and the proxy service center encrypts the AAP with the client public key and sends the AAP to the client; the client side adopts the private key of the client side to decrypt and obtain the AAP, and the login of the application side is completed.
- 10. The method for multi-application identity authentication according to claim 5, wherein in step four, the proxy service center encrypts the client public key with the proxy private key and sends the client public key to the application; and in the fifth step, the application terminal adopts the proxy public key to decrypt and verify the client public key, and uses the proxy public key to encrypt the authorization information and returns the authorization information to the proxy service center.
- 11. The method of claim 5, wherein the public key and private key generation are asymmetric algorithms.
- 12, method for identity authentication by using the multi-application identity authentication system of claim 1, comprising the steps of:step , the client generates a client public key and a private key pair, and stores the client public key and the private key pair in the client;secondly, the client sends a client public key to the proxy service center;thirdly, the client requests to log in a certain application end, and an information packet containing a client public key and application end information is encrypted by a client private key and sent to an agent service center;the agent service center decrypts the information packet by adopting the client public key and sends the client public key to a corresponding application end;and fifthly, the application side verifies the public key of the client side and returns the authorization information to the client side through the proxy service center according to the verification result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810808854.0A CN110740116B (en) | 2018-07-20 | 2018-07-20 | System and method for multi-application identity authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810808854.0A CN110740116B (en) | 2018-07-20 | 2018-07-20 | System and method for multi-application identity authentication |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110740116A true CN110740116A (en) | 2020-01-31 |
CN110740116B CN110740116B (en) | 2023-06-30 |
Family
ID=69235835
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810808854.0A Active CN110740116B (en) | 2018-07-20 | 2018-07-20 | System and method for multi-application identity authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110740116B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111431972A (en) * | 2020-03-05 | 2020-07-17 | 北京龙归科技有限公司 | Application authorization method, device, storage medium and system based on IDP proxy |
CN111669380A (en) * | 2020-05-28 | 2020-09-15 | 成都安恒信息技术有限公司 | Secret-free login method based on operation and maintenance audit system |
CN113676468A (en) * | 2021-08-17 | 2021-11-19 | 北京计算机技术及应用研究所 | Three-party enhanced authentication system design method based on message verification technology |
CN115065559A (en) * | 2022-08-15 | 2022-09-16 | 浙江毫微米科技有限公司 | Identity authentication system, method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105376221A (en) * | 2015-10-30 | 2016-03-02 | 福建天晴数码有限公司 | Game message encryption mechanism based on dynamic password, and game system |
CN105391734A (en) * | 2015-12-10 | 2016-03-09 | 布比(北京)网络技术有限公司 | Secure login system, secure login method, login server and authentication server |
CN105471833A (en) * | 2015-05-14 | 2016-04-06 | 瑞数信息技术(上海)有限公司 | Safe communication method and device |
CN108134787A (en) * | 2017-12-21 | 2018-06-08 | 恒宝股份有限公司 | A kind of identity identifying method and authentication device |
-
2018
- 2018-07-20 CN CN201810808854.0A patent/CN110740116B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105471833A (en) * | 2015-05-14 | 2016-04-06 | 瑞数信息技术(上海)有限公司 | Safe communication method and device |
CN105376221A (en) * | 2015-10-30 | 2016-03-02 | 福建天晴数码有限公司 | Game message encryption mechanism based on dynamic password, and game system |
CN105391734A (en) * | 2015-12-10 | 2016-03-09 | 布比(北京)网络技术有限公司 | Secure login system, secure login method, login server and authentication server |
CN108134787A (en) * | 2017-12-21 | 2018-06-08 | 恒宝股份有限公司 | A kind of identity identifying method and authentication device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111431972A (en) * | 2020-03-05 | 2020-07-17 | 北京龙归科技有限公司 | Application authorization method, device, storage medium and system based on IDP proxy |
CN111431972B (en) * | 2020-03-05 | 2022-09-20 | 北京龙归科技有限公司 | Application authorization method, device, storage medium and system based on IDP proxy |
CN111669380A (en) * | 2020-05-28 | 2020-09-15 | 成都安恒信息技术有限公司 | Secret-free login method based on operation and maintenance audit system |
CN111669380B (en) * | 2020-05-28 | 2022-07-19 | 成都安恒信息技术有限公司 | Secret-free login method based on operation and maintenance audit system |
CN113676468A (en) * | 2021-08-17 | 2021-11-19 | 北京计算机技术及应用研究所 | Three-party enhanced authentication system design method based on message verification technology |
CN115065559A (en) * | 2022-08-15 | 2022-09-16 | 浙江毫微米科技有限公司 | Identity authentication system, method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110740116B (en) | 2023-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10595201B2 (en) | Secure short message service (SMS) communications | |
US9847882B2 (en) | Multiple factor authentication in an identity certificate service | |
US8904180B2 (en) | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys | |
CA2590989C (en) | Protocol and method for client-server mutual authentication using event-based otp | |
CN110519046B (en) | Quantum communication service station key negotiation method and system based on one-time asymmetric key pair and QKD | |
CN106713279B (en) | video terminal identity authentication system | |
JP6471112B2 (en) | COMMUNICATION SYSTEM, TERMINAL DEVICE, COMMUNICATION METHOD, AND PROGRAM | |
CN110740116B (en) | System and method for multi-application identity authentication | |
CN108809633B (en) | Identity authentication method, device and system | |
CN107920052B (en) | Encryption method and intelligent device | |
CN110138548B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and DH protocol | |
CN108809936B (en) | Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof | |
CN114006736B (en) | Instant communication message protection system and method based on hardware password equipment | |
CN110233729B (en) | Encrypted solid-state disk key management method based on PUF | |
CN113204760B (en) | Method and system for establishing secure channel for software cryptographic module | |
CN102404337A (en) | Data encryption method and device | |
CN111917536A (en) | Identity authentication key generation method, identity authentication method, device and system | |
CN106656955A (en) | Communication method and system and user terminal | |
CN110098925B (en) | Quantum communication service station key negotiation method and system based on asymmetric key pool pair and random number | |
US10764260B2 (en) | Distributed processing of a product on the basis of centrally encrypted stored data | |
CN109040109B (en) | Data transaction method and system based on key management mechanism | |
CN102916810A (en) | Method, system and apparatus for authenticating sensor | |
CN110890959B (en) | Account encryption method, system and device | |
TW201901508A (en) | Authentication method for login capable of enhancing data security and protection of user privacies | |
EP3185504A1 (en) | Security management system for securing a communication between a remote server and an electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |