CN111585939B - End-to-end identity authentication and communication encryption method and system between Internet of things devices - Google Patents

End-to-end identity authentication and communication encryption method and system between Internet of things devices Download PDF

Info

Publication number
CN111585939B
CN111585939B CN201910120259.2A CN201910120259A CN111585939B CN 111585939 B CN111585939 B CN 111585939B CN 201910120259 A CN201910120259 A CN 201910120259A CN 111585939 B CN111585939 B CN 111585939B
Authority
CN
China
Prior art keywords
information
communication
module
identification
encryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910120259.2A
Other languages
Chinese (zh)
Other versions
CN111585939A (en
Inventor
刘振宇
陈俊璋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Zhiqu Technology Ltd
Original Assignee
Shenzhen Zhiqu Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Zhiqu Technology Ltd filed Critical Shenzhen Zhiqu Technology Ltd
Priority to CN201910120259.2A priority Critical patent/CN111585939B/en
Publication of CN111585939A publication Critical patent/CN111585939A/en
Application granted granted Critical
Publication of CN111585939B publication Critical patent/CN111585939B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides an end-to-end identity authentication and communication encryption method and system between Internet of things equipment, which comprise an initiating end and a responding end, wherein the initiating end is connected with the responding end.

Description

Method and system for end-to-end identity authentication and communication encryption between Internet of things devices
Technical Field
The invention relates to the field of secret communication, in particular to an end-to-end identity authentication and communication encryption method and system among Internet of things devices.
Background
Most of internet of things equipment on the market at present use plaintext protocol communication, or use fixed key and terminal communication, so the existence is easily monitored and cracked, leading to factor of safety to reduce, even used encryption communication, also internet of things equipment sends the data to the high in the clouds, then by the high in the clouds data forwarding to gateway or terminal, but the data is mostly preserved in the high in the clouds, thereby the high in the clouds is easily attacked by hacker and steals the data, leading to the factor of safety of encryption communication also can not be guaranteed.
Disclosure of Invention
In order to solve the technical problems, the invention provides an end-to-end identity authentication and communication encryption method and system among Internet of things devices, which prevent data from being attacked or lost through end-to-end identity identification and encryption communication, and have the characteristics of enhancing the confidentiality of data transmission and enhancing the safety of user data.
In a first aspect, the present invention includes a method for end-to-end identity authentication and communication encryption between devices of an internet of things, comprising;
acquiring first identification request information and first identification password information, wherein the first identification request information comprises identifier information and first communication token information;
encrypting the first identification request information according to the first identification password information, and recording as first identification encryption information;
decrypting the first identification encryption information according to the first identification password information;
judging that the identifier information and the first communication token information are stored when the first identification encryption information is decrypted successfully;
generating second identification password information;
storing the second identification password information and replacing the second identification password information with the first identification password information;
carrying out subsequent identification request according to the second identification password information;
and performing subsequent encrypted communication according to the first communication token information and the second identification password information.
Further, after decrypting the first identification encryption information according to the first identification password information, the method further includes:
judging when the decryption of the first identification encryption information fails;
the communication flow is terminated.
Further, after the subsequent encrypted communication is performed according to the first communication token information and the second identification password information, the method further includes:
acquiring update request information and update cycle information, wherein the update request information comprises second communication token information;
judging when the updating period expires according to the updating period information;
encrypting the updating request information according to the first communication token information, and marking as a first encryption updating request;
decrypting the first encryption updating request according to the first communication token;
judging when the first encryption updating request is decrypted successfully;
generating second communication token information;
storing the second communication token information and replacing the second communication token information with the first communication token information;
and carrying out encryption communication according to the second communication token information.
Further, after the decrypting the first encryption updating request according to the first communication token, the method further comprises the following steps;
judging when the decryption of the first encryption updating request fails;
and continuing to carry out encryption communication according to the first communication token information.
In a second aspect, the invention further includes a system for end-to-end identity authentication and communication encryption between devices of the internet of things, which includes an initiating terminal and a responding terminal;
the initiating end is connected with the responding end;
the initiating terminal comprises an information acquisition module, an encryption module and a first communication module, and the responding terminal comprises a decryption module, a processing module, an information generation module and a second communication module;
the information acquisition module, the encryption module and the first communication module are sequentially connected, and the decryption module, the processing module, the information generation module and the second communication module are sequentially connected;
the information acquisition module is used for acquiring first identification request information and the first identification password information, wherein the first identification request information comprises identifier information and first communication token information;
the encryption module is used for encrypting the first identification request information according to the first identification password information and recording the first identification request information as first identification encryption information;
the decryption module is used for decrypting the first identification encrypted information according to the first identification password information;
the processing module is used for judging whether the first identification encryption information is decrypted successfully or not, and storing the identifier information and the first communication token information;
the information generating module is used for generating second identification password information;
the processing module is also used for storing the second identification password information and replacing the second identification password information with the first identification password information;
the first communication module and the second communication module are used for carrying out subsequent identification requests according to the second identification password information;
the first communication module and the second communication module are further used for carrying out subsequent encrypted communication according to the first communication token information and the second identification password information.
Furthermore, the initiating terminal also comprises an updating period sending module,
the updating period sending module is connected with each module in the initiating terminal;
the first communication module and the second communication module are further configured to, after performing subsequent encrypted communication according to the first communication token information and the second identification password information, further include:
the information acquisition module is further configured to acquire update request information and update period information sent by the update period sending module, where the update request information includes second communication token information;
the processing module is further used for judging when the update period expires according to the update period information;
the encryption module is further used for encrypting the updating request information according to the first communication token information and recording as a first encryption updating request;
the decryption module is further used for decrypting the first encryption updating request according to the first communication token;
the processing module is further configured to determine that the decryption of the first encryption update request is successful;
the information generating module is also used for generating second communication token information;
the processing module is also used for storing the second communication token information and replacing the second communication token information with the first communication token information;
the first communication module and the second communication module are further used for carrying out encryption communication according to the second communication token information.
Further, the decryption module is further configured to, after decrypting the first encryption update request according to the first communication token, further include:
the processing module is further configured to determine that decryption of the first encryption update request fails;
the first communication module and the second communication module are further used for continuing encrypted communication according to the first communication token information.
By adopting the technical scheme, the communication between the end and the end is realized by setting the initiating end and the responding end without additionally setting a terminal, and the communication token in the encrypted communication is periodically updated by setting the updating period sending module, so that the safety coefficient of the encrypted communication is enhanced, and the safety of user data is ensured.
Drawings
Fig. 1 is a schematic diagram of a method of an embodiment of an end-to-end identity authentication and communication encryption method between devices of the internet of things of the present invention;
fig. 2 is a schematic diagram of a method for end-to-end identity authentication and communication encryption between devices of the internet of things according to another embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a method of end-to-end identity authentication and communication encryption between devices in the internet of things according to another embodiment of the present invention;
fig. 4 is a schematic diagram of a method of end-to-end identity authentication and communication encryption between devices in the internet of things according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of an embodiment of a system for end-to-end identity authentication and communication encryption between devices of the internet of things according to the present invention;
FIG. 6 is a schematic structural diagram of an initiating terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a response end in an embodiment of the present invention;
the number designations in the figures are: 10-initiating terminal, 20-answering terminal, 11-information acquisition module, 12-encryption module, 13-first communication module, 21-decryption module, 22-processing module, 23-information generation module, 24-second communication module, 25-communication termination module and 14-update period sending module.
Detailed Description
The following description of the embodiments of the present invention will be made with reference to the accompanying drawings. It should be noted that the description of the embodiments is provided to help understanding of the present invention, but the present invention is not limited thereto. In addition, the technical features involved in the embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
In a first aspect, as shown in fig. 1, the present invention includes a method for end-to-end identity authentication and communication encryption between devices in the internet of things, including;
s100, acquiring first identification request information and first identification password information, wherein the first identification request information comprises identifier information and first communication token information;
s200, encrypting the first identification request information according to the first identification password information, and recording as first identification encryption information;
s300, decrypting the first identification encryption information according to the first identification password information;
s400, when the first identification encryption information is successfully decrypted, the identifier information and the first communication token information are saved;
s500, generating second identification password information;
s600, storing the second identification password information and replacing the second identification password information with the first identification password information;
s700, carrying out subsequent identification requests according to the second identification password information;
and S800, performing subsequent encrypted communication according to the first communication token information and the second identification password information.
Further, as shown in fig. 2, after step S300:
s301, judging that the first identification encryption information fails to be decrypted;
and S302, terminating the communication flow.
Further, as shown in fig. 3, after the step 800, the method further includes:
s701, acquiring update request information and update cycle information, wherein the update request information comprises second communication token information;
s702, judging when the updating period expires according to the updating period information;
s703, encrypting the updating request information according to the first communication token information, and recording as a first encryption updating request;
s704, decrypting the first encryption updating request according to the first communication token;
s705, judging that the decryption of the first encryption updating request is successful;
s706, generating second communication token information;
s707, storing the second communication token information and replacing the second communication token information with the first communication token information;
and S708, carrying out encryption communication according to the second communication token information.
Further, as shown in fig. 4, after the step S704, the method further includes;
s708, judging when the decryption of the second identification encryption information fails;
and S709, continuing to carry out encryption communication according to the first communication token information.
In a second aspect, as shown in fig. 5, the present invention further includes a system for end-to-end identity authentication and communication encryption between devices in the internet of things, including an initiating terminal 10 and an answering terminal 20;
the initiating terminal 10 is connected with the answering terminal 20;
as shown in fig. 6 and 7, the initiating terminal 10 includes an information obtaining module 11, an encrypting module 12 and a first communication module 13, and the responding terminal 20 includes a decrypting module 21, a processing module 22, an information generating module 23 and a second communication module 24;
the information acquisition module 11, the encryption module 12 and the first communication module 13 are sequentially connected, and the decryption module 21, the processing module 22, the information generation module 23 and the second communication module 24 are sequentially connected;
the information obtaining module 11 is configured to obtain first identification request information and the first identification password information, where the first identification request information includes identifier information and first communication token information;
the encryption module 12 is configured to encrypt the first identification request information according to the first identification password information, and record the first identification request information as first identification encryption information;
the decryption module 21 is configured to decrypt the first identification encrypted information according to the first identification password information;
the processing module 22 is configured to determine that the identifier information and the first communication token information are stored when the first identification password information is successfully decrypted;
the information generating module 23 is configured to generate second identification password information;
the processing module 22 is further configured to store the second identification password information and replace the second identification password information with the first identification password information;
the first communication module 13 and the second communication module 24 are configured to perform a subsequent identification request according to the second identification password information;
the first communication module 13 and the second communication module 24 are further configured to perform subsequent encrypted communication according to the first communication token information and the second identification password information.
Further, as shown in fig. 7, the responder 20 further includes a communication termination module 25;
the communication termination module 25 is connected with each module in the response terminal 20;
then, after the decryption module 21 is configured to decrypt the first identification encrypted information according to the first identification password information, the method further includes:
the processing module 22 is further configured to determine that decryption of the first identification encryption information fails;
the communication termination module 25 is used for terminating the communication process.
Further, as shown in fig. 7, the initiating terminal 10 further includes an update period sending module 14;
the update period sending module 14 is connected with each module in the initiating terminal 10;
the first communication module 13 and the second communication module 24 are further configured to, after performing subsequent encrypted communication according to the first communication token information and the second identification password information, further include:
the information obtaining module 11 is further configured to obtain update request information and update period information sent by the update period sending module 14, where the update request information includes second communication token information;
the processing module 22 is further configured to determine, according to the update period information, when the update period expires;
the encryption module 12 is further configured to encrypt the update request information according to the first communication token information, and record the encrypted update request as a first encrypted update request;
the decryption module 21 is further configured to decrypt the first encryption updating request according to the first communication token;
the processing module 22 is further configured to determine that the decryption of the first encryption update request is successful;
the information generating module 23 is further configured to generate second communication token information;
the processing module 22 is further configured to store the second communication token information and replace the second communication token information with the first communication token information;
the first communication module 13 and the second communication module 24 are further configured to perform encrypted communication according to the second communication token information.
Further, the decryption module 21 is further configured to, after decrypting the first encrypted update request according to the first communication token, further include:
the processing module 22 is further configured to determine that the decryption of the first encryption update request fails;
the first communication module 13 and the second communication module 24 are further configured to continue encrypted communication according to the first communication token information.
In a specific application scenario of the present invention, the initiating terminal 10 and the responding terminal 20 are a mobile phone and an intelligent socket, respectively, and the identification password information is a matching code attached to the back of the intelligent socket;
when a user purchases an intelligent socket and the mobile phone is provided with the app application of the socket, the user opens the app, the mobile phone is connected to the intelligent socket through Bluetooth, wifi is configured for the intelligent socket, the box and the mobile phone are connected to the same wifi, the mobile phone finds the intelligent socket through a local area network and needs to be matched with the intelligent socket, the user inputs identification password information on the back of the intelligent socket, namely first identification password information into the mobile phone, the mobile phone generates a communication token, the mobile phone initiates an identification request to the intelligent socket, the identification request information is information obtained by encrypting an identifier of the mobile phone, namely the IMEI of the identifier and the IMEI of the first communication token through the first identification password information, after the intelligent socket receives the identification request of the mobile phone, the identification password stored in the intelligent socket is the first identification password information to decrypt the request information, if decryption fails, communication is terminated, if decryption succeeds, the intelligent socket stores the identifier and the communication token, namely the first communication token, generates a new password, namely a second identification password, uses the second identification information to remove the first identification password, stores the new identification password, and uses the second identification information to replace the subsequent identification request of other mobile phones. After the identification request is successful, the mobile phone stores the communication token, and the mobile phone can perform encryption communication through the first communication token, for example, the identification password of the smart socket is acquired to request encryption communication, and the request encryption communication of the smart socket is opened or closed. The mobile phone randomly sets a communication token period, if the period time is up, the mobile phone generates a second communication token, the second communication token is encrypted by using the stored communication token to generate updated communication token request information, the mobile phone initiates an updated communication token request to the smart socket, the smart socket receives the updated communication token request, the stored communication token, namely the first communication token, is used for decrypting the updated communication token request information, if the decryption is successful, the second communication token is stored, the second communication token is used for replacing the first communication token, the mobile phone and the smart socket carry out encrypted communication by using the second communication token, and if the decryption is failed, the mobile phone and the smart socket still carry out encrypted communication by using the first communication token.
The embodiments of the present invention have been described in detail above with reference to the accompanying drawings, but the present invention is not limited to the described embodiments. It will be apparent to those skilled in the art that various changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, and the scope of protection is still within the scope of the invention.

Claims (6)

1. An end-to-end identity authentication and communication encryption method between Internet of things devices is characterized by comprising the following steps:
acquiring first identification request information and first identification password information, wherein the first identification request information comprises identifier information and first communication token information;
encrypting the first identification request information according to the first identification password information, and recording as first identification encryption information;
decrypting the first identification encryption information according to the first identification password information;
judging that the identifier information and the first communication token information are stored when the first identification encryption information is decrypted successfully;
generating second identification password information;
storing the second identification password information and replacing the second identification password information with the first identification password information;
carrying out subsequent identification request according to the second identification password information;
carrying out subsequent encrypted communication according to the first communication token information and the second identification password information;
further comprising:
acquiring update request information and update cycle information, wherein the update request information comprises second communication token information;
judging when the updating period expires according to the updating period information;
encrypting the updating request information according to the first communication token information, and marking as a first encryption updating request;
decrypting the first encryption updating request according to the first communication token;
judging when the decryption of the first encryption updating request is successful;
storing the second communication token information and replacing the second communication token information with the first communication token information;
and carrying out encryption communication according to the second communication token information.
2. The method for end-to-end identity authentication and communication encryption between devices of the internet of things according to claim 1, wherein after decrypting the first identification encryption information according to the first identification password information, the method further comprises:
judging when the decryption of the first identification encryption information fails;
the communication flow is terminated.
3. The method for end-to-end identity authentication and communication encryption between internet of things devices according to claim 2, wherein after decrypting the first encryption update request according to the first communication token, the method specifically comprises:
judging when the decryption of the first encryption updating request fails;
and continuing to carry out encryption communication according to the first communication token information.
4. An end-to-end identity authentication and communication encryption system among Internet of things devices is characterized by comprising an initiating end and a responding end;
the initiating end is connected with the responding end;
the initiating terminal comprises an information acquisition module, an encryption module and a first communication module, and the responding terminal comprises a decryption module, a processing module, an information generation module and a second communication module;
the information acquisition module, the encryption module and the first communication module are sequentially connected, and the decryption module, the processing module, the information generation module and the second communication module are sequentially connected;
the information acquisition module is used for acquiring first identification request information and the first identification password information, wherein the first identification request information comprises identifier information and first communication token information;
the encryption module is used for encrypting the first identification request information according to the first identification password information and recording the first identification request information as first identification encryption information;
the decryption module is used for decrypting the first identification encrypted information according to the first identification password information;
the processing module is used for judging whether the decryption of the first identification password information is successful or not, and storing the identifier information and the first communication token information;
the information generating module is used for generating second identification password information;
the processing module is also used for storing the second identification password information and replacing the second identification password information with the first identification password information;
the first communication module and the second communication module are used for carrying out subsequent identification requests according to the second identification password information;
the first communication module and the second communication module are also used for carrying out subsequent encrypted communication according to the first communication token information and the second identification password information;
the initiating terminal also comprises an updating period sending module,
the updating period sending module is connected with each module in the initiating terminal;
the first communication module and the second communication module are further configured to, after performing subsequent encrypted communication according to the first communication token information and the second identification password information, further include:
the information acquisition module is further configured to acquire update request information and update cycle information sent by the update cycle sending module, where the update request information includes second communication token information;
the processing module is further used for judging when the updating period expires according to the updating period information;
the encryption module is also used for encrypting the updating request information according to the first communication token information and marking as a first encryption updating request;
the decryption module is further used for decrypting the first encryption updating request according to the first communication token;
the processing module is further configured to determine that the decryption of the first encryption update request is successful;
the information generation module is also used for generating second communication token information;
the processing module is also used for storing the second communication token information and replacing the second communication token information with the first communication token information;
the first communication module and the second communication module are further used for carrying out encryption communication according to the second communication token information.
5. The system for end-to-end identity authentication and communication encryption between devices of the internet of things according to claim 4, wherein the responder further comprises a communication termination module;
the communication termination module is connected with each module in the response end;
then, after the decryption module is configured to decrypt the first identification encrypted information according to the first identification password information, the method further includes:
the processing module is further used for judging when the decryption of the first identification encryption information fails;
the communication termination module is used for terminating the communication flow.
6. The system for end-to-end identity authentication and communication encryption among devices of the internet of things according to claim 5, wherein the decryption module is further configured to, after decrypting the first encryption update request according to the first communication token, further comprising:
the processing module is further configured to determine that decryption of the first encryption update request fails;
the first communication module and the second communication module are further used for continuing encrypted communication according to the first communication token information.
CN201910120259.2A 2019-02-18 2019-02-18 End-to-end identity authentication and communication encryption method and system between Internet of things devices Active CN111585939B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910120259.2A CN111585939B (en) 2019-02-18 2019-02-18 End-to-end identity authentication and communication encryption method and system between Internet of things devices

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910120259.2A CN111585939B (en) 2019-02-18 2019-02-18 End-to-end identity authentication and communication encryption method and system between Internet of things devices

Publications (2)

Publication Number Publication Date
CN111585939A CN111585939A (en) 2020-08-25
CN111585939B true CN111585939B (en) 2023-04-14

Family

ID=72125999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910120259.2A Active CN111585939B (en) 2019-02-18 2019-02-18 End-to-end identity authentication and communication encryption method and system between Internet of things devices

Country Status (1)

Country Link
CN (1) CN111585939B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115242486B (en) * 2022-07-19 2024-04-19 阿里巴巴(中国)有限公司 Data processing method, device and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051628A (en) * 2012-12-21 2013-04-17 微梦创科网络科技(中国)有限公司 Method and system for obtaining authentication token based on servers
CN105141584A (en) * 2015-07-29 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Smart home system equipment authentication methods, and devices
CN105791272A (en) * 2016-02-23 2016-07-20 青岛海尔智能家电科技有限公司 Method and device for secure communication in Internet of Things
CN106034028A (en) * 2015-03-17 2016-10-19 阿里巴巴集团控股有限公司 Terminal equipment authentication method, apparatus and system thereof
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN108449756A (en) * 2018-06-29 2018-08-24 北京邮电大学 A kind of system of network cryptographic key updating, method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051628A (en) * 2012-12-21 2013-04-17 微梦创科网络科技(中国)有限公司 Method and system for obtaining authentication token based on servers
CN106034028A (en) * 2015-03-17 2016-10-19 阿里巴巴集团控股有限公司 Terminal equipment authentication method, apparatus and system thereof
CN105141584A (en) * 2015-07-29 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Smart home system equipment authentication methods, and devices
CN105791272A (en) * 2016-02-23 2016-07-20 青岛海尔智能家电科技有限公司 Method and device for secure communication in Internet of Things
CN106850209A (en) * 2017-02-28 2017-06-13 苏州福瑞思信息科技有限公司 A kind of identity identifying method and device
CN108449756A (en) * 2018-06-29 2018-08-24 北京邮电大学 A kind of system of network cryptographic key updating, method and device

Also Published As

Publication number Publication date
CN111585939A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
EP3723399A1 (en) Identity verification method and apparatus
CN106464498B (en) Method for authenticating a first electronic entity by a second electronic entity and electronic entity
CN110192381B (en) Key transmission method and device
EP1976322A1 (en) An authentication method
CN106330442B (en) Identity authentication method, device and system
CN101102186B (en) Method for implementing general authentication framework service push
RU2683853C1 (en) Method for improving gprs key, sgsn device, user device, hlr / hss and gprs system
CN108762791A (en) Firmware upgrade method and device
CN109922474A (en) Trigger the method and relevant device of network authentication
CN111552935A (en) Block chain data authorization access method and device
US10419212B2 (en) Methods, systems, apparatuses, and devices for securing network communications using multiple security protocols
CN109565441B (en) Method for configuring a first communication device by using a second communication device
CN107566112A (en) Dynamic encryption and decryption method and server
CN101697522A (en) Virtual private network networking method, communication system and related equipment
CN111585939B (en) End-to-end identity authentication and communication encryption method and system between Internet of things devices
CN115868189A (en) Method, vehicle, terminal and system for establishing vehicle safety communication
CN105554759A (en) Authentication method and authentication system
WO2018043466A1 (en) Data extraction system, data extraction method, registration device, and program
CN114285557B (en) Communication decryption method, system and device
KR101329789B1 (en) Encryption Method of Database of Mobile Communication Device
EP3355546A1 (en) Device identification encryption
CN108156112B (en) Data encryption method, electronic equipment and network side equipment
CN111093169B (en) Communication establishing method and device
CN113079506B (en) Network security authentication method, device and equipment
CN111431839B (en) Processing method and device for hiding user identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant