CN111385793A - Instruction sending method, instruction sending system, electronic equipment and storage medium - Google Patents

Instruction sending method, instruction sending system, electronic equipment and storage medium Download PDF

Info

Publication number
CN111385793A
CN111385793A CN201811645677.5A CN201811645677A CN111385793A CN 111385793 A CN111385793 A CN 111385793A CN 201811645677 A CN201811645677 A CN 201811645677A CN 111385793 A CN111385793 A CN 111385793A
Authority
CN
China
Prior art keywords
data
key
command
count value
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811645677.5A
Other languages
Chinese (zh)
Other versions
CN111385793B (en
Inventor
吕晓建
仇兆峰
韩毅
单宏寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingeek Information Security Consulting Associates Co ltd
Original Assignee
Ingeek Information Security Consulting Associates Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingeek Information Security Consulting Associates Co ltd filed Critical Ingeek Information Security Consulting Associates Co ltd
Priority to CN201811645677.5A priority Critical patent/CN111385793B/en
Publication of CN111385793A publication Critical patent/CN111385793A/en
Application granted granted Critical
Publication of CN111385793B publication Critical patent/CN111385793B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]

Abstract

The invention relates to an instruction sending method, a system, electronic equipment and a storage medium, wherein the instruction sending method is used for the interactive access process with first electronic equipment and comprises the following steps: acquiring a first secret key; acquiring first write data sent by first electronic equipment; acquiring a current count value; decrypting at least the encrypted command ID by a preset algorithm according to the first key and the current count value to obtain a plaintext command ID; if the command matched with the plaintext command ID exists in the prestored command library, encrypting the plaintext command ID and the command execution result corresponding to the command ID through the current count value and the first secret key to generate first notification data, sending the first notification data to the first electronic device, and performing iterative updating of the preset algorithm on the current count value. The invention improves the safety and the accuracy of synchronous verification of the interactive command.

Description

Instruction sending method, instruction sending system, electronic equipment and storage medium
Technical Field
The present invention relates to the field of instruction transmission, and in particular, to an instruction transmission method, system, electronic device, and storage medium.
Background
In the instruction sending process of interactive access between electronic devices, the instruction may be tampered, intercepted, and missed to receive, and a situation that whether the sending process of the instruction is legal may not be determined, and a situation that the sending of the instruction cannot be further extracted may also occur.
Some conventional bluetooth communication means include: based on a bluetooth Serial Port Protocol (SPP), bidirectional stream transmission is realized, some security protocols of an open system interconnection reference model are directly transferred, for example, an identity of an opposite terminal is verified through a simple Challenge Handshake Authentication Protocol (CHAP), the identity is at least used for identity authentication after being verified, and no strong guarantee is provided for the security of a transmission data command.
Disclosure of Invention
The invention solves the technical problem of verifying the identities of the two ends and simultaneously improves the safety and the accuracy of synchronous verification of the command of electronic equipment interaction.
In order to solve the foregoing technical problem, an embodiment of the present invention provides an instruction sending method, which is used in an interactive access process, and includes the following steps:
acquiring a first secret key;
acquiring first write data sent by the first electronic equipment, wherein the first write data at least comprises an encrypted command ID;
acquiring a current count value, wherein if the first written data is acquired for the first time, the current count value is an initial count value, and if the first written data is not acquired for the first time, the current count value is a current count value obtained by iteratively updating a previous count value according to a preset algorithm;
decrypting at least the encrypted command ID by a preset algorithm according to the first key and the current count value to obtain the plaintext command ID;
if the command matched with the plaintext command ID exists in a prestored command library, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID through a current count value and the first key by using a preset algorithm to generate first notification data, sending the first notification data to the first electronic device, and performing iterative updating of the preset algorithm on the current count value.
In order to solve the above technical problem, an embodiment of the present invention further discloses an instruction sending method, including the following steps:
acquiring a current count value, wherein the current count value is an initial count value or a count value obtained by iteration updating of a last count value;
acquiring a first secret key;
encrypting a command ID by a preset algorithm according to the current count value and the first key to obtain first write-in data;
sending the first write data to the second electronic device for matching execution instructions;
and the current count value is subjected to iterative updating of a preset algorithm according to the generation of the first write data so as to participate in encryption of the next generation of the first write data.
In order to solve the above technical problem, an embodiment of the present invention further discloses an instruction sending system, which is used in an interactive access process, and includes: the method is used in the interactive access process and comprises the following steps:
the first counting value calculating unit is used for calculating a preset algorithm of the first initial counting factor and the second initial counting factor to obtain a current counting value;
the first obtaining module is used for obtaining a first secret key;
a write data acquisition module, configured to acquire first write data sent by the first electronic device, where the first write data at least includes an encrypted command ID;
the decryption module is used for decrypting at least the encrypted command ID by a preset algorithm according to the first secret key and the current count value to obtain the plaintext command ID;
the counting value acquisition module is used for acquiring a current counting value, wherein if the first written data is acquired for the first time, the current counting value is an initial counting value, and if the first written data is not acquired for the first time, the current counting value is a current counting value obtained by iteratively updating a previous counting value according to a preset algorithm;
and the notification data generation module is used for determining that a command which is matched with the plaintext command ID and is in the pre-stored command library exists in the pre-stored command library, executing a corresponding command according to the obtained plaintext command ID, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID through a current counting value and the first secret key to generate first notification data, and sending the first notification data to the first electronic device, wherein iteration updating of a preset algorithm is performed after the counting value is generated before the current counting value is preset according to the first notification data.
To solve the above technical problem, the present invention relates to an instruction sending system, which is used in an interactive access process, and comprises:
the counting value obtaining module is used for obtaining a current counting value, and the current counting value is an initial counting value or a counting value obtained by iterative updating of a last counting value;
the first key acquisition module is used for acquiring a first key;
the write-in data generation module is used for encrypting the command ID by a preset algorithm according to the current count value and the first key to obtain first write-in data;
and the matching instruction module is used for performing iterative updating of a preset algorithm on the current count value according to the generation of the first write data so as to participate in encryption for generating the first write data next time.
In order to solve the above technical problem, an embodiment of the present invention further discloses a bluetooth electronic device, including a memory and a processor, where the memory stores computer instructions executable on the processor, and the processor executes any of the steps of the instruction sending method when executing the computer instructions.
In order to solve the above technical problem, an embodiment of the present invention further discloses a computer storage medium, on which computer instructions are stored, and the computer instructions execute the steps of the instruction sending method when running.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
according to the technical scheme, the command ID is encrypted through the first key and the current count value and is sent to the second electronic equipment to be used for matching an execution instruction, then iterative updating is conducted on the current count value to be used for participating in encryption of next generation of first write data, the current count value is iteratively updated to participate in decryption of next first write data if the current count value is matched with the prestored command ID after the encryption command ID of the first write data sent by the first electronic equipment is obtained, and the initial count value of the current count value is obtained by the fact that the first electronic equipment and the second electronic equipment jointly negotiate, calculate and update, and therefore safety and accuracy of synchronous verification of interactive commands are improved.
Drawings
FIG. 1 is a first flowchart illustrating a first exemplary method for sending an instruction according to the present invention;
FIG. 2 is a flowchart illustrating a second exemplary method for sending a command according to the present invention;
FIG. 3 is a third flowchart illustrating a method for sending a command according to a first embodiment of the present invention;
FIG. 4 is a first flowchart illustrating a method for sending a command according to a second embodiment of the present invention;
FIG. 5 is a flowchart illustrating a second exemplary method for sending a command according to another embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a second embodiment of another instruction sending method according to the present invention;
FIG. 7 is a first schematic structural diagram of a first exemplary embodiment of a command issuing system according to the present invention;
FIG. 8 is a first schematic structural diagram of another first embodiment of a command issuing system;
FIG. 9 is a first schematic structural diagram of a second embodiment of an instruction issue system.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart illustrating a method for sending an instruction according to a first embodiment of the present invention.
In order to make the aforementioned objects, features and advantages of the present invention more comprehensible, a command transmitting method as shown in fig. 1 is described in detail below with reference to the accompanying drawings.
Fig. 1 is a flowchart of an instruction sending method according to an embodiment of the present invention, which is used in an interactive access process, and includes the following steps, which may all be implemented by a second electronic device.
Step S101, a first key is obtained.
Step S102, first write data sent by the first electronic device are obtained, wherein the first write data at least comprise an encrypted command ID.
And S103, acquiring a current count value, wherein if the first written data is acquired for the first time, the current count value is an initial count value, and if the first written data is not acquired for the first time, the current count value is a current count value obtained by iteratively updating the previous count value according to a preset algorithm.
And S104, at least decrypting the encrypted command ID by a preset algorithm according to the first secret key and the current count value to obtain the plaintext command ID.
And S105, if a command matched with the plaintext command ID exists in a pre-stored command library, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID through a current count value and the first key by using a preset algorithm to generate first notification data, sending the first notification data to the first electronic device, and performing iterative updating of the preset algorithm on the current count value.
Further, as shown in fig. 2, the method further includes: after step S104, step S106 is further included, if it is determined that the plaintext command ID does not match a command in a pre-stored command library, the command execution is terminated, and the current count value is unchanged.
Further, as shown in fig. 3, in step S103, if the current count value is the initial count value, the method further includes:
s131, acquiring a first initial counting factor of the first electronic device.
And S132, generating a second initial counting factor, and sending the second initial counting factor to the first electronic equipment so that the first electronic equipment can calculate and generate an initial counting value by using the first initial counting factor in cooperation with a preset algorithm.
Specifically, the first electronic device may perform calculation of a preset algorithm according to the first initial counting factor and the obtained second initial counting factor to obtain an initial counting value, encrypt the command ID according to the initial counting value, generate encrypted first write data, and send the encrypted first write data to the second electronic device.
And S133, calculating a preset algorithm by the first initial counting factor and the second initial counting factor to obtain an initial counting value. Wherein the initial count value may be a constant.
And if the command matched with the plaintext command ID exists in the prestored command library, executing the corresponding command according to the obtained plaintext command ID, and simultaneously generating first notification data.
In this embodiment, by setting the generation process of the current count value, both the first electronic device and the second electronic device can obtain the current count value by using the same calculation method through the random numbers respectively generated by the first electronic device and the second electronic device, if the current count values obtained by the first electronic device and the second electronic device are the same, the security of data transmission can be improved, and the encryption process of command data transmission is participated in according to the current count value, the current count value is used as a parameter of the encryption process, which is hidden and difficult to obtain, thereby preventing malicious tampering of a third party, the second electronic device verifies the received command, and iterates the current count value after generating the first notification data, thereby ensuring the accuracy of the command receiving sequence of the second electronic device, and preventing omission or repeated receiving of the command.
Preferably, after step S105, the method further includes: and if the clear text command ID is determined not to be matched with the command in the pre-stored command library, terminating the command execution and keeping the current count value unchanged.
In this case, the final plaintext command ID may be inaccurate due to inconsistency between the current count value participating in encryption and the current count value participating in decryption; the command matching is considered to fail at this time due to the fact that the data is tampered or maliciously attacked by a third party in the transmission process, the current counting value is not changed, and the command in the interaction process is considered not to be correctly sent to the second electronic device.
As shown in fig. 4, a second embodiment of an instruction sending method according to the present invention, where S101 in the first embodiment is executed to obtain a first key specifically through S211-S215, includes the following steps:
step S211, obtaining a reading request sent by the first electronic device, generating second notification data at least comprising an identity ID and a challenge code, and sending the second notification data to the first electronic device. Specifically, the challenge code may be a random number.
Step S212, second write data sent by the first electronic equipment is obtained, wherein the second write data at least comprises the second key factor corresponding to the identity ID; performing preset algorithm calculation according to the second key factor and a pre-stored second key to generate a third key; wherein the second key factor is a parameter used to calculate the third key.
The second key factor corresponding to the identity ID of the second electronic device is obtained from the first electronic device, and finally the third key is obtained by performing preset algorithm calculation according to the pre-stored first key, so that the obtained third key is obtained by participating in the first electronic device, and the third key is used as an encryption key for subsequent interaction, so that the second key has negotiation with the first electronic device, and the safety basis of data exchange at two ends is realized.
As a preferred embodiment, the first electronic device also stores a second key factor corresponding to the identity ID, and the first electronic device also stores a long-term key (i.e., a second key) or the first electronic device can obtain the long-term key (i.e., the second key) corresponding to the identity ID through the identity ID. If the acquired identity ID is sent to a third terminal device through the first electronic device, the third terminal device obtains the second key corresponding to the identity ID, generates the third key and the second key factor in the third terminal device according to the preset algorithm, and sends the third key and the second key factor to the first electronic device, and the first electronic device generates the first write data from the second key factor, where the second key factor is a parameter used for calculating the third key.
Preferably, the long-term key is updated once at a preset first period, and the third key is updated once at a second period, since the security of the third key is based on the security of the second key, the second period is generally shorter than the first period to ensure higher security of the third key, since the first electronic device and the second electronic device are both based on the same preset algorithm.
And the first electronic equipment also obtains a third key by calculation according to the obtained second key factor and a pre-stored first key through a preset algorithm, or at least stores a second key factor for generating the third key. Therefore, the first electronic device side and the second electronic device side both store the third key; and the third keys at the two ends are generated according to the matching of the ID, the second key and the corresponding preset algorithm, so that the same third key is obtained by calculation at the two ends for subsequent calculation, and the safety basis of data exchange at the two ends is realized.
Step S213, obtaining third write data sent by the first electronic device, where the third write data at least includes encrypted data of the first negotiation data and encrypted data of the challenge code authentication data generated by the first electronic device.
Step S214, at least carrying out preset algorithm decryption on the encrypted data of the first negotiation data and the challenge code authentication data in the third written data through the third secret key, confirming that the challenge code authentication data obtained through decryption and the challenge code authentication pass, and generating the first secret key according to the first negotiation data obtained through decryption and locally generated second negotiation data.
The first negotiation data at least comprises a third random number and first electronic equipment characteristic data; the second negotiation data comprises at least a fourth random number and local feature data.
The encrypted first negotiation data and the challenge code authentication data are obtained by encrypting the second key calculated in step S214 as a key, so that the basic data interaction security is ensured. And then, a negotiation key, namely a first key is generated according to the first negotiation data of the first electronic device and the second negotiation data of the second electronic device and is used as a key for subsequent data interaction of the two electronic devices, so that the further security of the data interaction is ensured, and the first key can be only used as a key for the next interaction.
Preferably, after step S214, the method further includes step S215: and generating third notification data for encrypting the second negotiation data by a preset algorithm according to the third key, and sending the third notification data to the first electronic equipment so that the first electronic equipment can generate the first key.
And the first electronic equipment also generates a first key by a preset algorithm according to the first negotiation data and the second negotiation data.
Preferably, in step S103, after the third write data sent by the first electronic device is acquired in step S213, the third write data further includes encrypted data of a first initial counting factor, and step S216 is further included, where the encrypted data of the first initial counting factor is decrypted by using the third key through a preset algorithm, so as to obtain the first initial counting factor.
Further, in S213, sending the second initial count factor to the first electronic device for the first electronic device to calculate and generate the current count value thereof, specifically including: and generating third notification data obtained by encrypting the second initial counting factor and the second negotiation data according to a preset algorithm by the third key, and sending the third notification data to the first electronic equipment.
S202 (not shown in the figure) obtains first write data sent by the first electronic device, where the first write data at least includes an encrypted command ID.
S203 (not shown in the figure) obtains a current count value, where the current count value is an initial count value if the first written data is obtained for the first time, and the current count value is a current count value obtained by iteratively updating the previous count value according to a preset algorithm if the first written data is not obtained for the first time. S204 (not shown in the figure), first write-in data sent by the first electronic device is obtained, wherein the first write-in data at least comprises an encrypted command ID, and the encrypted command ID is decrypted by a preset algorithm according to the first secret key and a current count value to obtain the plaintext command ID.
S205 (not shown in the figure), if the command ID of the plaintext is determined to be matched with a command in a prestored command library, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID by a preset algorithm through a current count value and the first key to generate first notification data, and sending the first notification data to the first electronic device; and the current count value is subjected to iterative updating of a preset algorithm.
The implementation and beneficial effects of steps S202 to S205 may refer to S102 to S105 in the first embodiment of the instruction sending method, and are not described herein again.
Preferably, after step S205, step S206 (not shown in the figure) is further included:
and generating third notification data for encrypting the second negotiation data by a preset algorithm according to the third key, and sending the third notification data to the first electronic equipment so that the first electronic equipment can generate the first key.
Therefore, the first electronic device and the second electronic device obtain the first key as the negotiation key of the instruction interaction through the same parameters and algorithms.
Preferably, step S131 in the first embodiment is after step S213, and the third write data further includes encrypted data of a first initial counting factor, and step S131 specifically includes:
and decrypting a preset algorithm according to the encrypted data of the first initial counting factor by the second key to obtain the first initial counting factor.
Because the first initial counting factor uses the encrypted data of the pre-stored second key and the pre-stored second key is used for decryption, the transmission process of the first initial counting factor can be more stable, and the third written data is sent together, so that the transmission flow is simplified.
Preferably, after step S212 in step S132, the sending the second initial counting factor to the first electronic device specifically includes: and generating third notification data obtained by encrypting the second initial counting factor and the second negotiation data according to a preset algorithm by using the third key generated in the step S212, and sending the third notification data to the first electronic device.
Preferably, after step S212, the sending the second initial counting factor to the first electronic device in step S132 specifically includes: after the second negotiation data is generated, third notification data in which the second initial counting factor and the second negotiation data are encrypted by a preset algorithm according to the third key generated in step S212 is generated, and the third notification data is sent to the first electronic device.
Preferably, the second write data further includes identity authentication data of a public end to prove that the second key factor is authenticated by the public end, and the performing of the preset algorithm calculation according to the second key factor and a pre-stored second key in step S212 to generate a third key specifically includes:
and performing identity authentication of the public terminal according to the public terminal identity authentication data in the first write data and a locally stored public terminal key, and if the authentication is successful, performing preset algorithm calculation according to the second key factor and a pre-stored first key to generate a third key.
Preferably, the second write data further includes identity authentication data of a public end to prove that the second key factor is authenticated by the public end, preferably, an asymmetric signature algorithm is adopted, and the second electronic device stores a signature public key of the public end. Performing preset algorithm calculation according to the second key factor and a pre-stored second key to generate a third key, specifically including:
and performing identity authentication of the public terminal according to the public terminal identity authentication data in the first write data and a locally stored public terminal key, and if the authentication is successful, performing preset algorithm calculation according to the second key factor and a pre-stored first key to generate a third key. The identity authentication data can be a private key signature, namely, the identity authentication can be carried out in an asymmetric encryption mode.
After obtaining the plaintext command ID, the method further includes:
and S207, determining that the number of times that the plain text command ID is not matched with the commands in the pre-stored command library exceeds a preset number of times, terminating the command execution, keeping the initial count value unchanged, and jumping the state value of the current state characteristic value to the last state value or the first state value in the preset state value matrix.
In this embodiment, the bluetooth communication mode may be used for interaction, the state characteristic value may be a characteristic value set in the bluetooth GATT protocol, a jump sequence and a jump direction between state values are specified in the state value matrix, a condition that a current state value needs to be met for jumping is specified, and a current state characteristic value specifies an operation that can be received and executed by a current state, including a command and a command ID corresponding to the state value matrix. For example, it is stated in the state value matrix that when the current state value is in the first state value, only the command corresponding to the specific command ID can be executed, and only the command corresponding to the specific command ID is executed, the first state value can be jumped to the second state value.
Furthermore, if the operation attribute is matched with the operation attribute, the operation corresponding to the operation attribute is executed according to the preset first operation data, and the state value of the state characteristic value is jumped to the relevant state value in the preset operation state value matrix.
After the first state value jumps, the state value of the jumped state characteristic value can be notified to the Bluetooth service electronic equipment through Bluetooth.
Fig. 5 is a flowchart of a first embodiment of an instruction transmitting method according to the present invention.
The instruction sending method shown in fig. 5, which is used in the interactive access process, may be implemented by the first electronic device, and includes the following steps:
s301, acquiring a current count value, wherein the current count value is an initial count value or a count value obtained by iterative updating of a last count value.
S302, a first key is obtained.
S303, encrypting the command ID by a preset algorithm according to the current count value and the first key to obtain first write-in data.
S304, the first written data are sent to the second electronic device to be used for matching an execution instruction, and iteration updating of a preset algorithm is carried out on a current count value according to the generation of the first written data so as to participate in encryption of the next generation of the first written data.
As shown in fig. 6, it is preferable to further include S305 to S308 after S304.
S305, acquiring first notification data sent by the second electronic equipment.
S306, acquiring a current count value, wherein the current count value is the count value obtained by the last iteration update of the count value, namely the current count value is not the initial count value. That is, the current count value in this step is the count value obtained by the iterative update in step S304.
S307, decrypting the first notification data through the current count value and the first key to obtain a plaintext.
And S308, if the plaintext is determined to be consistent with the command ID and the execution result corresponding to the preset command ID, the command is determined to be successfully executed, and iterative computation is carried out through a preset iterative algorithm to update so as to obtain a new current count value.
Preferably, in S301, if the current count value is an initial count value, the method further includes:
s311, a second initial counting factor sent by the second electronic device is obtained.
S312 generates a first initial counting factor, and sends the first initial counting factor to the second electronic device for the second electronic device to generate its initial counting value.
S313, the second initial counting factor and the first initial counting factor are calculated by a preset algorithm to obtain an initial counting value.
Specifically, the second electronic device may perform calculation of a preset algorithm according to the first initial counting factor and the obtained second initial counting factor to obtain an initial counting value, and decrypt the first notification data according to the initial counting value to obtain a plaintext to match the command ID and the preset command ID.
Preferably, step S302 further includes:
step S321 (not shown in the figure), sending a reading request to the second electronic device, and acquiring second notification data sent by the second electronic device, where the second notification data at least includes an identity ID and a challenge code.
Step S322 (not shown in the figure) of obtaining a corresponding third key and a second key factor for calculating the third key according to the identity ID, and sending second write data at least including the second key factor for calculating the third key to the second electronic device.
Step S323 (not shown in the figure), locally generating and storing first negotiation data, encrypting at least the challenge code and the first negotiation data according to the third key to obtain third write data, and sending the third write data to the second electronic device.
Step S324 (not shown in the figure) is to decrypt the encrypted second negotiation data with the third key, and generate the first key by using a preset algorithm on the plaintext second negotiation data and the first negotiation data, where the second negotiation data includes a fourth random number and second electronic device feature data, and the first negotiation data includes a third random number and local feature data.
And finally, the third key is obtained by calculating a preset algorithm according to the pre-stored first key, so that the obtained third key is obtained by participating in the second electronic equipment, and the third key is used as an encryption key for subsequent interaction, has the negotiation performance with the second electronic equipment, and realizes the safety basis of data exchange at two ends.
Preferred S311 includes:
and obtaining third notification data sent by the second electronic device, where the third notification data includes the encrypted second negotiation data and the encrypted second initial counting factor. The convenience of transmission is improved, and the safety is guaranteed simultaneously.
Preferably, in S312, the sending the first initial counting factor to the second electronic device includes:
and encrypting at least the second initial counting factor, the challenge code and the first negotiation data according to the third key to obtain third write-in data, and sending the third write-in data to the second electronic equipment.
Preferably, in step S322, obtaining a corresponding third key and a second key factor for calculating the third key according to the identity ID includes:
and sending the identity ID to a third terminal, and acquiring a second key corresponding to the identity ID returned by the third terminal, a second key factor used for calculating the third key and identity authentication data (private key signature) of the third terminal to prove that the second key factor is authenticated by the third terminal.
Preferably, the method further comprises S315; sending the identity ID to a cloud server, and acquiring identity authentication data generated by the cloud server according to a prestored private key through a preset asymmetric algorithm;
the first write data further comprises identity authentication data acquired from a cloud server.
FIG. 7 is a schematic structural diagram of a first embodiment of a command issuing system according to the present invention.
An instruction transmission system 40, used in an interactive access process, comprising: a first count value calculation unit 41, a first acquisition module 42, a write data acquisition module 43, a decryption module 44, a first count value acquisition module 45, and a notification data generation module 46. The command transmission system 40 may be implemented by an electronic device with a bluetooth communication means.
The first count value calculating unit 41 is configured to perform calculation of a preset algorithm on the first initial counting factor and the second initial counting factor to obtain a current count value.
A first obtaining module 42, configured to obtain the first key.
A write data obtaining module 43, configured to obtain first write data sent by the first electronic device, where the first write data at least includes an encrypted command ID.
And the decryption module 44 is configured to decrypt, according to the first key and the current count value, at least the encrypted command ID by using a preset algorithm to obtain the plaintext command ID.
A first count value obtaining module 45, configured to obtain a current count value, where the current count value is an initial count value if the first write-in data is obtained for the first time, and the current count value is a current count value obtained by iteratively updating a previous count value according to a preset algorithm if the first write-in data is not obtained for the first time.
The notification data generating module 46 is configured to, if it is determined that a command matching the plaintext command ID and the prestored command library exists in the prestored command library, execute a corresponding command according to the obtained plaintext command ID, encrypt the command ID of the plaintext and the command execution result corresponding to the command ID by using the current count value and the first key according to a preset algorithm to generate first notification data, and send the first notification data to the first electronic device, where iteration update of the preset algorithm is performed after the count value is generated according to the first notification data before the current count value is preset.
Preferably, the command terminating module is connected to the connection decrypting module 44, and configured to terminate the command execution if it is determined that the plaintext command ID is not matched with a command in a pre-stored command library, and the current count value is not changed.
If the current count value is the initial count value, the first count value calculating module 41 includes: then, the method comprises the following steps:
the first initial counting factor acquisition unit is used for acquiring a first initial counting factor of the first electronic equipment;
the second initial counting factor generating unit is used for generating a second initial counting factor, and sending the second initial counting factor to the first electronic equipment so that the first electronic equipment can calculate and generate an initial counting value of the first electronic equipment by using the first initial counting factor in a matched manner and using a preset algorithm;
and the first initial value calculation unit is used for calculating the first initial counting factor and the second initial counting factor by a preset algorithm to obtain an initial counting value.
Preferably, the first obtaining module 42 includes:
the reading unit is used for acquiring a reading request sent by first electronic equipment, generating second notification data at least comprising an Identity (ID) and a challenge code, and sending the second notification data to the first electronic equipment;
a third key generation unit, configured to acquire second write data sent by the first electronic device, where the second write data at least includes the second key factor corresponding to the identity ID; performing preset algorithm calculation according to the second key factor and a pre-stored second key to generate a third key;
a third write data obtaining unit, configured to obtain third write data sent by the first electronic device, where the third write data at least includes encrypted data of first negotiation data and encrypted data of challenge code authentication data generated by the first electronic device;
a first key generation unit, configured to decrypt, by using the third key, at least the encrypted data of the first negotiation data and the challenge code authentication data in the third write data with a preset algorithm, and generate the first key according to the decrypted first negotiation data and locally generated second negotiation data if it is determined that the challenge code authentication data obtained by decryption passes the challenge code authentication;
the first negotiation data at least comprises a third random number and first electronic equipment characteristic data; the second negotiation data at least comprises a fourth random number and local feature data;
further comprising: a third data sending module, configured to:
and generating third notification data for encrypting the second negotiation data by a preset algorithm according to the third key, and sending the third notification data to the first electronic equipment so that the first electronic equipment can generate the first key.
Preferably, the third write data further includes encrypted data of a first initial count factor, and the third write data includes:
and decrypting the encrypted data of the first initial counting factor by using the third key through a preset algorithm to obtain the first initial counting factor.
Preferably, in the second initial counting factor generating unit, the sending the second initial counting factor to the first electronic device includes:
and generating third notification data obtained by encrypting the second initial counting factor and the second negotiation data according to a preset algorithm by the third key, and sending the third notification data to the first electronic equipment.
Preferably, the second write data further includes identity authentication data of a public end to prove that the second key factor is authenticated by the public end, and the third key generation unit performs preset algorithm calculation according to the second key factor and a pre-stored second key to generate a third key, specifically including:
and performing identity authentication of the public terminal according to the public terminal identity authentication data in the first write data and a locally stored public terminal key, and if the authentication is successful, performing preset algorithm calculation according to the second key factor and a pre-stored first key to generate a third key.
The command termination module is further configured to: and determining that the number of times that the plain text command ID is not matched with the commands in the pre-stored command library exceeds a preset number of times, terminating the command execution, keeping the initial count value unchanged, and jumping the state value of the current state characteristic value to the last state value or the first state value in the preset state value matrix.
The specific implementation and beneficial effects of the instruction sending system can be found in the records of the first embodiment and the second embodiment of the instruction sending method, and are not described herein again.
FIG. 8 is a first embodiment of another instruction issue system of the present invention, comprising
An instruction sending system 50 shown in fig. 8, which is used in the interactive access process, may include: a second count value acquisition module 51, a first key acquisition module 52, a write data generation module 53, and a matching instruction module 54.
A second count value obtaining module 51, configured to obtain a current count value, where the current count value is an initial count value or a count value obtained by iteratively updating a last count value;
a first key obtaining module 52, configured to obtain a first key;
a write data generation module 53, configured to encrypt the command ID by using a preset algorithm according to the current count value and the first key to obtain first write data;
and the matching instruction module 54 is configured to perform iterative updating of a preset algorithm on the current count value according to the generation of the first write data, so as to participate in encryption for generating the first write data next time.
Preferably, the system further comprises:
the first notification data acquisition module is used for acquiring first notification data sent by the second electronic equipment;
the third counting value obtaining module is used for obtaining a current counting value, wherein the current counting value is obtained by iteration updating of the last counting value; decrypting the first notification data through a current count value and the first key to obtain a plaintext;
and the execution command updating module is used for determining that the plaintext is consistent with the command ID and the execution result corresponding to the preset command ID, determining that the command is successfully executed, and performing iterative computation and updating through a preset iterative algorithm to obtain a new current count value.
If the current count value is the initial count value, the second count value obtaining module 51 further includes:
the second initial counting factor acquisition unit is used for acquiring a second initial counting factor sent by the second electronic equipment;
the first initial counting factor generating unit is used for generating a first initial counting factor and sending the first initial counting factor to the second electronic equipment so that the second electronic equipment can generate an initial counting value of the first initial counting factor;
and the second initial count value calculating unit is used for calculating a preset algorithm by using the second initial count factor and the first initial count factor to obtain an initial count value.
The first key obtaining module further comprises:
the second notification data sending unit is used for sending a reading request to the second electronic device and acquiring second notification data sent by the second electronic device, wherein the second notification data at least comprises an Identity (ID) and a challenge code;
a second write data sending unit, configured to obtain a corresponding third key and a second key factor used for calculating the third key according to the identity ID, and send second write data at least including the second key factor used for calculating the third key to the second electronic device;
a third write data sending unit, configured to locally generate and store first negotiation data, encrypt at least the challenge code and the first negotiation data according to the third key to obtain third write data, and send the third write data to the second electronic device;
a key generating unit, configured to decrypt third negotiation data, which is obtained and sent by the second electronic device, with the third notification data including the encrypted second negotiation data, and generate a first key through a preset algorithm with the plaintext second negotiation data and the first negotiation data, where the second negotiation data includes a fourth random number and second electronic device feature data; the first negotiation data comprises a third random number and local feature data.
Preferably, the second initial counting factor obtaining unit specifically includes:
and obtaining third notification data sent by the second electronic device, where the third notification data includes the encrypted second negotiation data and the encrypted second initial counting factor.
Preferably, in the second count value obtaining module, the sending the first initial count factor to the second electronic device includes:
and encrypting at least the second initial counting factor, the challenge code and the first negotiation data according to the third key to obtain third write-in data, and sending the third write-in data to the second electronic equipment.
Preferably, in the second write data sending unit, the obtaining of the corresponding third key and the second key factor used for calculating the third key according to the identity ID includes:
and sending the identity ID to a third terminal, and acquiring a second key corresponding to the identity ID returned by the third terminal, a second key factor used for calculating the third key and identity authentication data (private key signature) of the third terminal to prove that the second key factor is authenticated by the third terminal.
The writing data generation module further comprises the step of sending the identity ID to a cloud server to obtain identity authentication data generated by the cloud server according to a prestored private key through a preset asymmetric algorithm;
the first write data further comprises identity authentication data acquired from a cloud server.
The specific implementation manner and beneficial effects of the instruction sending system 50 can be seen from the description of the first embodiment of another instruction sending method, and are not described herein again.
A second embodiment of an instruction issuing system shown in fig. 9 includes an instruction issuing system 40 and an instruction issuing system 50, the instruction issuing system 40 including: a first count value calculation unit 41, a first acquisition module 42, a write data acquisition module 43, a decryption module 44, a first count value acquisition module 45, and a notification data generation module 46. The instruction transmission system 50 includes a second count value acquisition module 51, a first key acquisition module 52, a write data generation module 53, and a matching instruction module 54.
The embodiment of the present invention further provides an electronic device, which includes a memory and a processor, where the memory stores computer instructions executable on the processor, and the processor executes the computer instructions to perform the steps in the instruction sending method described in any of the foregoing embodiments. The electronic device may be a mobile terminal, a vehicle-mounted device, and the like, and is not limited.
The embodiment of the present invention further provides a computer storage medium, on which computer instructions are stored, and when the computer instructions are executed, the steps in the instruction sending method described in any of the foregoing embodiments are implemented. The computer storage medium may be any tangible medium, such as a floppy disk, a CD-ROM, a DVD, a hard drive, even a network medium, and the like.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer-readable storage medium, and the storage medium may include: ROM, RAM, magnetic or optical disks, and the like.
It should be understood that although one implementation form of the embodiments of the present invention described above may be a computer program product, the method or apparatus of the embodiments of the present invention may be implemented in software, hardware, or a combination of software and hardware. The hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory and executed by a suitable instruction execution system, such as a microprocessor or specially designed hardware. It will be appreciated by those of ordinary skill in the art that the methods and apparatus described above may be implemented using computer executable instructions and/or embodied in processor control code, such code provided, for example, on a carrier medium such as a disk, CD or DVD-ROM, programmable memory such as read only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The methods and apparatus of the present invention may be implemented in hardware circuitry, such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, or in software for execution by various types of processors, or in a combination of hardware circuitry and software, such as firmware.
It should be understood that although several modules or units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, according to exemplary embodiments of the invention, the features and functions of two or more modules/units described above may be implemented in one module/unit, whereas the features and functions of one module/unit described above may be further divided into implementations by a plurality of modules/units. Furthermore, some of the modules/units described above may be omitted in some application scenarios.
It is to be understood that the description has described only some of the key, not necessarily essential, techniques and features, and may not have described features that could be implemented by those skilled in the art, in order not to obscure the embodiments of the invention.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalents and the like within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (20)

1. An instruction sending method is used in an interactive access process with a first electronic device, and comprises the following steps:
acquiring a first secret key;
acquiring first write data sent by the first electronic equipment, wherein the first write data at least comprises an encrypted command ID;
acquiring a current count value, wherein if the first written data is acquired for the first time, the current count value is an initial count value, and if the first written data is not acquired for the first time, the current count value is a current count value obtained by iteratively updating a previous count value according to a preset algorithm;
decrypting at least the encrypted command ID by a preset algorithm according to the first key and the current count value to obtain the plaintext command ID;
if the command matched with the plaintext command ID exists in a prestored command library, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID through a current count value and the first key by using a preset algorithm to generate first notification data, sending the first notification data to the first electronic device, and performing iterative updating of the preset algorithm on the current count value.
2. The method of claim 1,
after obtaining the plaintext command ID, the method further includes:
and if the clear text command ID is determined not to be matched with the command in the pre-stored command library, terminating the command execution and keeping the current count value unchanged.
3. The method of claim 1, wherein the obtaining the current count value, if the current count value is an initial count value, comprises:
acquiring a first initial counting factor of first electronic equipment;
generating a second initial counting factor, and sending the second initial counting factor to the first electronic equipment so that the first electronic equipment can calculate and generate an initial counting value by using the first initial counting factor in cooperation with a preset algorithm;
and calculating a preset algorithm on the first initial counting factor and the second initial counting factor to obtain an initial counting value.
4. The method of claim 1 or 3, wherein the obtaining the first key further comprises:
acquiring a reading request sent by first electronic equipment, generating second notification data at least comprising an Identity (ID) and a challenge code, and sending the second notification data to the first electronic equipment;
acquiring second write data sent by the first electronic device, wherein the second write data at least comprises the second key factor corresponding to the identity ID; performing preset algorithm calculation according to the second key factor and a pre-stored second key to generate a third key;
acquiring third write data sent by the first electronic device, wherein the third write data at least comprises encrypted data of first negotiation data and encrypted data of challenge code authentication data generated by the first electronic device;
decrypting at least the encrypted data of the first negotiation data and the challenge code authentication data in the third written data by the third key through a preset algorithm, and generating the first key according to the decrypted first negotiation data and locally generated second negotiation data if the challenge code authentication data obtained by decryption and the challenge code authentication pass;
the first negotiation data at least comprises a third random number and first electronic equipment characteristic data; the second negotiation data at least comprises a fourth random number and local feature data;
after the obtaining the first key, the method further includes:
and generating third notification data for encrypting the second negotiation data by a preset algorithm according to the third key, and sending the third notification data to the first electronic equipment so that the first electronic equipment can generate the first key.
5. The method of claim 4, wherein the obtaining the first initial count factor of the first electronic device, and after obtaining third write data sent by the first electronic device, the third write data further includes encrypted data of the first initial count factor, and the method further includes:
and decrypting the encrypted data of the first initial counting factor by using the third key through a preset algorithm to obtain the first initial counting factor.
6. The method of claim 5, wherein sending the second initial counting factor to the first electronic device comprises:
and generating third notification data obtained by encrypting the second initial counting factor and the second negotiation data according to a preset algorithm by the third key, and sending the third notification data to the first electronic equipment.
7. The method of claim 3,
the second write data further includes identity authentication data of a public terminal to prove that the second key factor is generated by performing preset algorithm calculation on the second key factor and a pre-stored second key after the public terminal authenticates, and the method specifically includes:
and performing identity authentication of the public terminal according to the public terminal identity authentication data in the first write data and a locally stored public terminal key, and if the authentication is successful, performing preset algorithm calculation according to the second key factor and a pre-stored first key to generate a third key.
8. The method of claim 1, wherein after obtaining the plaintext command ID, further comprising:
and determining that the number of times that the plain text command ID is not matched with the commands in the pre-stored command library exceeds a preset number of times, terminating the command execution, keeping the initial count value unchanged, and jumping the state value of the current state characteristic value to the last state value or the first state value in the preset state value matrix.
9. An instruction sending method is used in an interactive access process, and comprises the following steps:
acquiring a current count value, wherein the current count value is an initial count value or a count value obtained by iteration updating of a last count value;
acquiring a first secret key;
encrypting a command ID by a preset algorithm according to the current count value and the first key to obtain first write-in data;
sending the first write data to the second electronic device for matching execution instructions;
and the current count value is subjected to iterative updating of a preset algorithm according to the generation of the first write data so as to participate in encryption of the next generation of the first write data.
10. The method of claim 9, further comprising:
acquiring first notification data sent by the second electronic equipment;
acquiring a current count value, wherein the current count value is a count value obtained by iteration updating of a last count value; decrypting the first notification data through a current count value and the first key to obtain a plaintext;
and if the plaintext is determined to be consistent with the command ID and the execution result corresponding to the preset command ID, the command is determined to be successfully executed, and iterative computation is carried out through a preset iterative algorithm to update so as to obtain a new current count value.
11. The method of claim 10, wherein the obtaining the current count value further comprises, if the current count value is an initial count value:
acquiring a second initial counting factor sent by the second electronic equipment;
generating a first initial counting factor, and sending the first initial counting factor to the second electronic device for the second electronic device to generate an initial counting value thereof;
and calculating a preset algorithm on the second initial counting factor and the first initial counting factor to obtain an initial counting value.
12. The method of claim 11, wherein obtaining the first key further comprises: sending a reading request to the second electronic device, and acquiring second notification data sent by the second electronic device, wherein the second notification data at least comprises an Identity (ID) and a challenge code;
obtaining a corresponding third key and a second key factor used for calculating the third key according to the identity ID, and sending second write-in data at least comprising the second key factor used for calculating the third key to the second electronic equipment;
locally generating and storing first negotiation data, encrypting at least the challenge code and the first negotiation data according to the third key to obtain third write-in data, and sending the third write-in data to the second electronic device;
decrypting the second negotiation data by using the third secret key, and generating a first secret key by using a plaintext second negotiation data and the first negotiation data through a preset algorithm, wherein the second negotiation data comprises a fourth random number and second electronic device characteristic data; the first negotiation data comprises a third random number and local feature data.
13. The method of claim 12, wherein obtaining a second initial count factor for a second electronic device comprises:
and obtaining third notification data sent by the second electronic device, where the third notification data includes the encrypted second negotiation data and the encrypted second initial counting factor.
14. The method of claim 12, wherein sending the first initial counting factor to a second electronic device comprises:
and encrypting at least the second initial counting factor, the challenge code and the first negotiation data according to the third key to obtain third write-in data, and sending the third write-in data to the second electronic equipment.
15. The method of claim 11, wherein obtaining the corresponding third key and the second key factor for calculating the third key according to the identity ID comprises:
and sending the identity ID to a third terminal, and acquiring a second key corresponding to the identity ID returned by the third terminal, a second key factor used for calculating the third key and identity authentication data of the third terminal to prove that the second key factor is authenticated by the third terminal.
16. The method of claim 11, further comprising sending the identity ID to a cloud server, and obtaining identity authentication data generated by the cloud server according to a pre-stored private key through a preset asymmetric algorithm;
the first write data further comprises identity authentication data acquired from a cloud server.
17. An instruction transmission system, for use in an interactive access process, comprising:
the first counting value calculating unit is used for calculating a preset algorithm of the first initial counting factor and the second initial counting factor to obtain a current counting value;
the first obtaining module is used for obtaining a first secret key;
a write data acquisition module, configured to acquire first write data sent by the first electronic device, where the first write data at least includes an encrypted command ID;
the decryption module is used for decrypting at least the encrypted command ID by a preset algorithm according to the first secret key and the current count value to obtain the plaintext command ID;
the first counting value acquisition module is used for acquiring a current counting value, wherein if the first written data is acquired for the first time, the current counting value is an initial counting value, and if the first written data is not acquired for the first time, the current counting value is a current counting value obtained by iteratively updating a previous counting value according to a preset algorithm;
and the notification data generation module is used for determining that a command which is matched with the plaintext command ID and is in the pre-stored command library exists in the pre-stored command library, executing a corresponding command according to the obtained plaintext command ID, encrypting the command ID of the plaintext and a command execution result corresponding to the command ID through a current counting value and the first secret key to generate first notification data, and sending the first notification data to the first electronic device, wherein iteration updating of a preset algorithm is performed after the counting value is generated before the current counting value is preset according to the first notification data.
18. An instruction transmission system, for use in an interactive access process, comprising:
the second counting value obtaining module is used for obtaining a current counting value, and the current counting value is an initial counting value or a counting value obtained by iterative updating of a last counting value;
the first key acquisition module is used for acquiring a first key;
the write-in data generation module is used for encrypting the command ID by a preset algorithm according to the current count value and the first key to obtain first write-in data;
and the matching instruction module is used for performing iterative updating of a preset algorithm on the current count value according to the generation of the first write data so as to participate in encryption for generating the first write data next time.
19. An electronic device comprising a memory and a processor, the memory having stored thereon computer instructions executable on the processor, when executing the computer instructions, performing the steps of the instruction transmitting method according to any one of claims 1 to 17.
20. A computer storage medium having computer instructions stored thereon, wherein the computer instructions when executed perform the steps of the method of transmitting instructions of any of claims 1 to 17.
CN201811645677.5A 2018-12-30 2018-12-30 Instruction sending method, system, electronic equipment and storage medium Active CN111385793B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811645677.5A CN111385793B (en) 2018-12-30 2018-12-30 Instruction sending method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811645677.5A CN111385793B (en) 2018-12-30 2018-12-30 Instruction sending method, system, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111385793A true CN111385793A (en) 2020-07-07
CN111385793B CN111385793B (en) 2023-06-09

Family

ID=71218287

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811645677.5A Active CN111385793B (en) 2018-12-30 2018-12-30 Instruction sending method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111385793B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008030184A1 (en) * 2006-07-04 2008-03-13 Khee Seng Chua Improved authentication system
CN102223364A (en) * 2011-05-09 2011-10-19 飞天诚信科技股份有限公司 Method and system for accessing e-book data
US20120260107A1 (en) * 2011-04-08 2012-10-11 Infineon Technologies Ag Instruction Encryption/Decryption Arrangement and Method with Iterative Encryption/Decryption Key Update
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008030184A1 (en) * 2006-07-04 2008-03-13 Khee Seng Chua Improved authentication system
US20120260107A1 (en) * 2011-04-08 2012-10-11 Infineon Technologies Ag Instruction Encryption/Decryption Arrangement and Method with Iterative Encryption/Decryption Key Update
CN102223364A (en) * 2011-05-09 2011-10-19 飞天诚信科技股份有限公司 Method and system for accessing e-book data
US20130097419A1 (en) * 2011-05-09 2013-04-18 Feitian Technologies Co., Ltd. Method and system for accessing e-book data
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device

Also Published As

Publication number Publication date
CN111385793B (en) 2023-06-09

Similar Documents

Publication Publication Date Title
CN104869175B (en) Cross-platform account resource-sharing implementation method, apparatus and system
JP6364026B2 (en) Secure computing device accessories
CN110473318B (en) Unlocking method, equipment for realizing unlocking and computer readable medium
US9020149B1 (en) Protected storage for cryptographic materials
EP3121991B1 (en) System and method of user authentication using digital signatures
US10938789B2 (en) System and method for trusted presentation of information on untrusted user devices
CN113014444B (en) Internet of things equipment production test system and safety protection method
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN109361508A (en) Data transmission method, electronic equipment and computer readable storage medium
CN113395406B (en) Encryption authentication method and system based on power equipment fingerprint
CN112235301B (en) Access right verification method and device and electronic equipment
CN110740128A (en) off-line data encryption method and device
JP2017524306A (en) Protection against malicious changes in cryptographic operations
CN110505185A (en) Auth method, equipment and system
US20200145220A1 (en) Verification system, verification method and non-transitory computer readable storage medium
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
CN117240625B (en) Tamper-resistant data processing method and device and electronic equipment
CN114513345A (en) Information transmission system, user device and information security hardware module
US9177123B1 (en) Detecting illegitimate code generators
CN111177676B (en) Verification system, verification method, and non-transitory computer-readable recording medium
CN111356118B (en) Interactive key generation method, system, bluetooth electronic device and storage medium
CN111385793B (en) Instruction sending method, system, electronic equipment and storage medium
CN108390757A (en) Processing method of communication data, device, electronic equipment, program and medium
CN109684852B (en) Guiding device and method for data exchange
CN112579998A (en) Webpage access method, management system and electronic equipment in information interaction platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant