CN111586688B - Method for generating and verifying identity based on environment perception - Google Patents

Method for generating and verifying identity based on environment perception Download PDF

Info

Publication number
CN111586688B
CN111586688B CN202010332031.2A CN202010332031A CN111586688B CN 111586688 B CN111586688 B CN 111586688B CN 202010332031 A CN202010332031 A CN 202010332031A CN 111586688 B CN111586688 B CN 111586688B
Authority
CN
China
Prior art keywords
data processing
terminal equipment
processing point
dynamic
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010332031.2A
Other languages
Chinese (zh)
Other versions
CN111586688A (en
Inventor
易琛军
钟斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Talos Technology Co ltd
Original Assignee
Shenzhen Talos Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Talos Technology Co ltd filed Critical Shenzhen Talos Technology Co ltd
Priority to CN202010332031.2A priority Critical patent/CN111586688B/en
Publication of CN111586688A publication Critical patent/CN111586688A/en
Application granted granted Critical
Publication of CN111586688B publication Critical patent/CN111586688B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a method for generating and verifying an identity mark based on environment awareness, which comprises the following steps: the method comprises the steps that an algorithm set and an algorithm sequencing and priority selection mechanism which are available to both parties are determined through a predefined, configuration or negotiation interaction mode between terminal equipment and a data processing point; the terminal equipment sends the element for calculating the main ID and the main algorithm to the data processing point, and the data processing point locally restores the main ID of the terminal; meanwhile, the terminal equipment adopts dynamic ID when interacting with the data processing point, and the dynamic ID is generated by triggering dynamic ID generating operation by the terminal equipment under the preset condition and according to the environment information. The application improves the identity identification and verification scheme in the prior art, adopts an algorithm set and a priority selection mechanism, does not need to transmit the main ID of the terminal equipment in the whole communication process, and adopts the dynamic ID generated regularly or according to the need to interact in the communication process, thereby avoiding the risk of being imitated by a third party in the communication process.

Description

Method for generating and verifying identity based on environment perception
Technical Field
The application relates to the field of information security authentication, in particular to an identity identification generation and verification method based on environment awareness.
Background
The conventional generation and verification of the identity of the mobile terminal equipment generally adopts the following modes: the terminal equipment transmits the original data periodically acquired by the sensor group to a data processing point (such as a server or other terminal equipment) for processing through an internet of things transmission network, and the interaction between the terminal equipment and the data processing point needs to use the main ID of the terminal equipment. The master ID is an identity for identifying and verifying a terminal device in internet of things communication, and existing schemes are through MAC addresses, IP addresses or identification strings generated based on these addresses. The conventional method based on the MAC address or the IP address is easy to impersonate, and cannot verify whether the terminal is authentic, and once generated, the method based on the address generates the identification string. With the popularity of mobile terminals, and the popularity of Location Based Services (LBS), security of user data is a great challenge in this area.
Disclosure of Invention
The following presents a simplified summary of embodiments of the application in order to provide a basic understanding of some aspects of the application. It should be understood that the following summary is not an exhaustive overview of the application. It is not intended to identify key or critical elements of the application or to delineate the scope of the application. Its purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is discussed later.
According to one aspect of the present application, there is provided a method for generating and verifying an identity based on environmental awareness, the method comprising:
the terminal equipment communicates with the data processing point (such as a server or other terminal equipment), and the terminal equipment and the data processing point determine an algorithm set (such as common SHA1 and MD5 and a main algorithm) available to both sides and an algorithm ordering and priority selection mechanism in the algorithm set through predefining, configuration or negotiation interaction and other modes; the terminal equipment sends the element for calculating the main ID and the main algorithm to the data processing point according to the algorithm set and the algorithm ordering and priority selection mechanism, and the data processing point locally restores the main ID of the terminal according to the element for calculating the main ID and the main algorithm provided by the terminal equipment; meanwhile, the terminal equipment adopts dynamic ID when interacting with the data processing point, and the dynamic ID is generated by triggering (timing triggering or environment variable changing triggering) the dynamic ID generating operation under the preset condition by the terminal equipment and according to the environment information. Meanwhile, the dynamic ID is further calculated by taking the main ID as a parameter. The dynamic ID generation algorithm may select the same algorithm as the master ID to calculate the dynamic ID, or may select a different algorithm to calculate the dynamic ID. The dynamic ID may be updated by a change in an environmental parameter in which the device is located, or may be updated by time. The environment information can be updated by generating random numbers when the environment information is unchanged.
The algorithm set and the algorithm ordering and priority selecting mechanism are changed and updated regularly according to the pre-agreed strategy of the terminal equipment and the data processing point.
The terminal equipment and the data processing point are used for generating a main algorithm of a main ID, and the main algorithm meets the following conditions: so that the generation of the master ID is re-available while being random. The re-availability means that a developer of the data processing point can recover the main ID of the equipment through a specific program based on the running log, and the function is mainly used for debugging and positioning; the randomness is to ensure that each generation of master ID is not identical and is irregularly circulated. Wherein, ID generation: it is necessary to define the elements needed to generate the ID, calculate the elements using existing algorithms (to ensure achievement of the above-described principles), and rationally formulate the conditions and methods to trigger dynamic updates in conjunction with the actual scenario. Use of ID: the master ID is not transmitted after being generated, and the actual authentication is realized by the dynamic ID, so that random change and short-time validity of the dynamic ID generation are ensured, and the master cannot monitor and crack, and is only temporary even if being counterfeited. This also makes the application unnecessary to consume excessive computing power or resources to ensure safety, and is also suitable for wider object connection requirements.
Further, the data processing point locally restores the main ID of the terminal according to the element for calculating the main ID and the main algorithm provided by the terminal device, which specifically includes: the terminal equipment sends self physical information and other parameters and a main algorithm for generating a main ID to the data processing point, simultaneously sends feedback information to the terminal equipment, records the main ID of the terminal equipment, restores the main ID of the terminal according to the parameters sent by the terminal equipment and the main algorithm thereof, and simultaneously sends the feedback information to the terminal equipment and records the self physical information of the terminal equipment. Among them, the own physical information includes, but is not limited to: network port address, CPUID, storage specification (memory, flash, etc.), wireless information (WiFi address, wiFi SSID, bluetooth address, lora address, etc.), and some special physical information (eporom information, etc.).
As an achievable scheme, the terminal device and the data processing point are preset with the same main algorithm for generating the main ID, the main algorithm is a character string with a preset length, m character strings identify manufacturer IDs, n character strings identify product types, and the rest character identification sequences; the sequence is obtained by calculating hash through hardware related parameters (such as cpu, mac address, wifi mac and the like) of the device and surrounding environment related parameters (gps position, surrounding wifi ssid, environment temperature, humidity and the like), and random numbers can be added. Wherein, the character string with the preset length can be determined according to the actual requirement. For example 128/256, or 64 characters shorter, or 1024 characters longer.
The application provides a method for improving the identity identification and verification scheme of the prior art by using the MAC address, the IP address or the identification string generated based on the addresses, and adopts the mode of generating a main ID algorithm set and an algorithm ordering and priority selection mechanism thereof, so that the main ID of terminal equipment is not required to be transmitted in the whole communication process, and dynamic IDs can be generated by the main ID at regular time or according to the requirement, thereby avoiding being imitated by a third party in the communication process.
The terminal equipment adopts dynamic ID which is dynamically generated when interacting with the data processing point, specifically, the terminal equipment collects surrounding environment information, triggers ID generation operation according to preset timing conditions or the change of the variables of the environment information, and generates dynamic ID according to the environment information and the main ID; when the terminal equipment interacts with the data processing point, the information header sent by the terminal equipment to the data processing point comprises dynamic and environment information and dynamic ID generation algorithm codes (algorithm codes corresponding to the algorithm set), and the data processing point analyzes and obtains the dynamic ID according to the dynamic ID generation algorithm codes. The surrounding environment information includes, but is not limited to, dynamic gateway information (IP, MAC), wireless related information (existing WiFi SSID, signal strength, etc.), physical information of the access device, geographic information, temperature and humidity (if any), etc.;
when the terminal equipment interacts with the data processing point, the data processing point only stores the analyzed main ID and is not used, and the dynamic ID is used for interaction in the process of information interaction with the terminal equipment; the dynamic ID is also not directly used for interaction, but is obtained by analysis by adopting an algorithm corresponding to a specified algorithm code. Therefore, in the whole process of interaction between the terminal equipment and the data processing point, the whole communication process has very good safety and is not easy to generate any counterfeiting phenomenon by the algorithm protection of generating the ID (generating the main ID and generating the dynamic ID) twice. The algorithms for generating the ID may be the same or different. In addition, the data processing point only verifies the dynamic ID of the terminal equipment, the dynamic ID of the terminal equipment cannot be generated, the data processing point only stores the dynamic ID of the current interaction, and the dynamic ID of the terminal equipment is updated according to time or notification of the terminal equipment, so that the interaction between the data processing point and the terminal equipment has better security.
The application can dynamically update the ID based on the environmental information (reported temperature and humidity, gps, surrounding information and the like), and the information can also be used for judging whether the terminal is counterfeit or not. The server can analyze and judge whether the server is imitated, stolen or the like according to the reported historical data; the basis of the dynamic perception of the server side is that reported historical data is subjected to big data analysis and machine learning, and the purpose of dynamic generation of the ID is based on the big data analysis and the machine learning; the two are matched with each other.
Through the scheme, the application has the following advantages: the identity of the terminal equipment is identified by adopting the dynamic ID which is dynamically generated, so that the main ID of the terminal equipment is protected, the identity of the terminal equipment is verified by combining environment information, and the safety of data in the information interaction process is greatly ensured.
Drawings
The application may be better understood by referring to the following description in conjunction with the accompanying drawings in which like or similar reference numerals are used to indicate like or similar elements throughout the several views. The accompanying drawings, which are included to provide a further illustration of the preferred embodiments of the application and together with a further understanding of the principles and advantages of the application, are incorporated in and constitute a part of this specification. In the drawings:
FIG. 1 is a flow chart of a method of identity generation and verification according to the present application.
Detailed Description
Embodiments of the present application will be described below with reference to the accompanying drawings. It should be noted that the illustration and description of components and processes known to those skilled in the art, which are not relevant to the present application, have been omitted in the drawings and description for the sake of clarity.
For identifying and verifying the identity of an internet of things communication terminal, conventionally through a MAC address, an IP address, or an identification string generated based on these addresses, and with the popularity of Location Based Services (LBS), information security of users is mentioned to one and its important locations. The application provides the method for generating and verifying the identity with high reliability and high safety by improving the existing method for generating and verifying the identity.
Specifically, the method for generating and verifying the identification mark based on the environment perception comprises the following steps:
process 1: the terminal equipment interacts with the server (or other terminal equipment used as a data processing point) and determines an algorithm set and an algorithm ordering and priority selection mechanism thereof which are available to both parties through a predefined, configuration or negotiation interaction mode;
when the algorithm set available to both parties is implemented, several different algorithms for generating IDs, such as SHA, MD5 or a main algorithm, may be predefined, and fixed algorithm codes (numbers) are given to correspond to the corresponding algorithms, and the transmission algorithm codes are used to replace the corresponding algorithms in the interaction process. In addition, the algorithm for generating the master ID may define its own master algorithm in different applications, for example, a 256-byte character string is calculated by adding a random number, a time stamp, and the like to the MAC address, the bluetooth address, the CPUID, and the like, so as to identify the master ID.
Process 2: the terminal equipment sends the element for calculating the main ID and the main algorithm to the server according to the algorithm set and the algorithm ordering and priority selection mechanism; the server locally restores the main ID of the terminal according to the element (parameter) for calculating the main ID provided by the terminal equipment and the main algorithm; in the subsequent interaction process, the two parties orderly transform the algorithm according to the appointed algorithm set and the updating strategy and calculate the elements required for generating the dynamic ID according to the appointed selection mechanism so as to update the ID or verify the validity of the ID.
The main algorithm sent by the terminal equipment can be the most suitable method selected according to the hardware capability of the terminal equipment, and can also be the corresponding algorithm selected according to the specific application scene. The element for calculating the main ID at least comprises the self physical information of the terminal equipment, the server receives and records the corresponding information sent by the terminal equipment, generates the main ID of the terminal equipment according to the information, records the corresponding relation between the main ID and the reported physical information, returns the method number, the random number and the time stamp used for generating the main ID to the terminal equipment, and generates and records the self main ID according to the information and the self physical information. In the whole process, the main ID is not transmitted between the terminal equipment and the service segment, so that the main ID is not monitored and imitated;
the self physical information may include the following physical information: network port address, CPUID, storage specification (memory, flash, etc.), wireless related information (WiFi address, wiFi SSID, bluetooth address, lora address, etc.), and some special physical information (eporom information, etc.).
The initial generation process of the master ID may be implemented by the following scheme: firstly, the terminal equipment calculates a character string d0=f1 (manufacturer ID, product model, CPUID or type, MAC address) according to the manufacturer ID, the product model, the CPU ID or type and the MAC address, encrypts a calculation result and a calculation method ID1 by using a server public key, and sends the encryption result and all parameters participating in calculation to the server. The server decrypts the private key to obtain d0, calculates the method ID1, finds f1 according to the ID, calculates a character string S0 through f1, the vendor ID, the product model, the cpu ID or the type and the mac address (including Bluetooth, wiFi and Internet) sent by the terminal, compares the character strings after decryption with the character string S0, and if the character strings are consistent (s0= d 0), the data processing node generates a random number r0, otherwise, returns an error. D (d=f (D0, r 0)) is calculated from D0 and r0, and the server records D and encrypts with the terminal public key and returns to the terminal. The terminal decrypts the D with the private key and records the D. The initial master ID generation process ends.
The update process of the master ID is as follows: the terminal equipment calculates D1 = fn (D, GPS, ssid … …) according to the GPS position of the equipment, wifi ssid existing around, ambient temperature, humidity and the like, encrypts a calculation method ID by a server public key, then sends the calculation method ID, the server together with D1 and all parameters (GPS, ssid … …) participating in calculation to the server, decrypts the calculation method ID to obtain n, calculates and judges whether the calculation method ID is consistent with D1 through fn (D, GPS, ssid … …), records D1 and returns success if the calculation method ID is consistent with D1, otherwise returns failure. All subsequent interactions use D1 as ID. According to the strategy, the update D1 is promoted according to the change of the peripheral information (gps position update and environmental temperature and humidity change) at a certain time.
Process 3: the terminal equipment generates the dynamic ID of the terminal equipment according to the perceived environmental information before communication or at a fixed time through the generated main ID of the terminal equipment and the algorithm code which is interactively determined with the server and generates the dynamic ID. Carrying equipment dynamic ID, selected environment information and algorithm codes for generating the dynamic ID in the information header when the terminal equipment and the server interact information;
the terminal device perceives surrounding environment information, including but not limited to gateway information (IP, MAC), wireless related information (existing WiFi SSID, signal strength, etc.), physical information of the access device, geographic information, humiture (if any), etc., and records the information;
the server only stores the generation of the main ID, and the dynamic ID is used for interaction in the whole information interaction process with the terminal equipment. The generation of the dynamic ID also requires the server and the terminal device to select a method of generating the dynamic ID again, which may be the same as or different from the method of generating the master ID. The server only verifies the dynamic ID of the terminal equipment, the dynamic ID of the terminal equipment cannot be generated, the server can store the dynamic ID interacted with the dynamic ID, and the dynamic ID of the terminal equipment is updated according to time or notification of the terminal equipment.
The method comprises the steps of reporting the selected environment information and generating the algorithm code of the dynamic ID so that the server can inquire the corresponding terminal equipment main ID according to the information and verify whether the reported dynamic ID is consistent with the dynamic ID of the current information interaction period according to the method to confirm the validity of the terminal equipment.
Process 4: verification ID: the server analyzes the received delivery information of the terminal equipment, analyzes the dynamic ID, the selected environment information, generates algorithm codes of the dynamic ID and the like. According to the physical information of the message header, such as a MAC address, an IP address and the like, a corresponding equipment ID chain can be inquired, the main ID of the terminal equipment is obtained by inquiring the ID chain, the corresponding dynamic ID is analyzed through the main ID of the terminal equipment, the selected environment information and the selected algorithm, whether the dynamic ID is consistent with the reported dynamic ID or not is judged, if the dynamic ID is inconsistent with the reported dynamic ID, the corresponding dynamic ID is illegal, and if the dynamic ID is consistent with the reported dynamic ID, the corresponding dynamic ID is legal.
Wherein the delivery information includes, but is not limited to: periodically reporting data, fault information, alarm information and the like to a server by the terminal equipment; the server sends data control instructions, dynamic strategies, version updating and the like to the terminal equipment.
Wherein the terminal device triggers an operation of updating the dynamic ID at a timing or before each communication. The dynamic ID may be bi-directional. The communication between the terminal equipment and the terminal equipment can be realized, and the communication between the terminal equipment and the server can be realized. The above process protects the main ID of the terminal equipment, and the transmission of the main ID of the equipment is not required in the whole communication process; meanwhile, the ID can be generated regularly or dynamically according to the requirement, so that the imitation by a third party in the communication process is avoided.
In addition, the identity mark based on the environment perception, which is realized by the scheme, can be transmitted in all communication equipment based on the consensus, and the terminal equipment can automatically select whether to record or not according to the requirement and can also inquire the central node. When a public query point exists or a server can provide a query, selecting not to record; a common query point should be provided when there is no central node or no fixed server. These query points may be distributed.
It should be emphasized that the term "comprises/comprising" when used herein is taken to specify the presence of stated features, elements, steps or components, but does not preclude the presence or addition of one or more other features, elements, steps or components.
Furthermore, the methods of the present application are not limited to being performed in the time sequence described in the specification, but may be performed in other time sequences, in parallel or independently. Therefore, the order of execution of the methods described in the present specification does not limit the technical scope of the present application.
While the application has been disclosed in the context of specific embodiments, it should be understood that all embodiments and examples described above are illustrative rather than limiting. Various modifications, improvements, or equivalents of the application may occur to persons skilled in the art and are within the spirit and scope of the following claims. Such modifications, improvements, or equivalents are intended to be included within the scope of this application.

Claims (7)

1. A method for generating and verifying an identity mark based on environment perception is characterized in that: the method comprises the following steps:
the method comprises the steps that an algorithm set and an algorithm sequencing and priority selection mechanism which are available to both parties are determined through a predefined, configuration or negotiation interaction mode between terminal equipment and a data processing point;
the terminal equipment sends the element for calculating the main ID and the main algorithm to the data processing point according to the algorithm set and the algorithm ordering and priority selection mechanism, and the data processing point locally restores the main ID of the terminal according to the element for calculating the main ID and the main algorithm provided by the terminal equipment;
meanwhile, the terminal equipment adopts dynamic ID when interacting with the data processing point, and the dynamic ID is generated by triggering dynamic ID generating operation by the terminal equipment under the preset condition and according to the environment information;
the terminal equipment adopts dynamic ID which is dynamically generated when interacting with the data processing point, specifically, the terminal equipment collects surrounding environment information, triggers ID generation operation according to preset timing conditions or the change of the variables of the environment information, and generates dynamic ID according to the environment information and the main ID; when the terminal equipment interacts with the data processing point, the information header sent by the terminal equipment to the data processing point comprises dynamic and environment information and a dynamic ID generation algorithm, and the data processing point analyzes and obtains the dynamic ID according to the dynamic ID generation algorithm.
2. The method for generating and verifying an identity according to claim 1, wherein: the algorithm set and the algorithm ordering and priority selecting mechanism are changed and updated regularly according to the pre-agreed strategy of the terminal equipment and the data processing point.
3. The method for generating and verifying an identity according to claim 2, wherein: the surrounding environment information comprises dynamic gateway information and/or wireless related information and/or physical information and/or geographic information and/or temperature and humidity information of the access equipment.
4. The method for generating and verifying an identity according to claim 1 or 2, wherein: the terminal equipment and the data processing point are used for generating a main algorithm of a main ID, and the main algorithm meets the following conditions: so that the generation of the master ID is re-available while being random.
5. The method for generating and verifying an identity according to claim 1 or 2, wherein: the terminal equipment and the data processing point are preset with the same main algorithm for generating a main ID, wherein the main algorithm is a character string with a preset length, m character strings identify manufacturer IDs, n character strings identify product models, and the rest character strings identify sequences; the sequence is obtained by calculating related parameters of hardware of the equipment and related parameters of surrounding environment.
6. The method for generating and verifying an identity according to claim 5, wherein: the initial master ID generation process includes:
firstly, a terminal device calculates a character string d0=f1 (manufacturer ID, product model, cpu ID or type, mac address) according to the manufacturer ID, the product model, the cpu ID or type, and the mac address, then encrypts a calculation result and a calculation method ID1 by using a public key of a data processing point, and sends the encryption result and all parameters participating in calculation to the data processing point;
the data processing point decrypts the private key to obtain d0, the computing method ID1 finds f1 according to the ID, a character string S0 is obtained through f1 and manufacturer ID, product model, cpu ID or type and mac address calculation sent by the terminal, the character string is used for comparing the decrypted character string, if the decrypted character string is consistent, the data processing node generates a random number r0, and otherwise, an error is returned;
d is calculated according to D0 and r0, d=f (D0, r 0), and the data processing point records D and returns to the terminal after encrypting by using the public key of the terminal;
the terminal decrypts the D with the private key and records the D.
7. The method for generating and verifying an identity according to claim 6, wherein: the update process of the master ID is as follows: the terminal equipment calculates D1 = fn (D, GPS, ssid, ambient temperature, humidity) according to the GPS position of the equipment and wifi ssid, ambient temperature and humidity existing around the equipment, the terminal equipment encrypts a calculation method ID by using a public key of a data processing point and then sends the data processing point together with D1 and all parameters participating in calculation to the data processing point, the data processing point decrypts to obtain n, and calculates and judges whether the calculated result is consistent with D1 or not through fn (D, GPS, ssid, ambient temperature, humidity), if so, the D1 is recorded and success is returned, otherwise failure is returned; all subsequent interactions use D1 as ID; and meanwhile, according to the strategy, the update D1 is triggered at the reservation time according to the change of the peripheral information.
CN202010332031.2A 2020-04-24 2020-04-24 Method for generating and verifying identity based on environment perception Active CN111586688B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010332031.2A CN111586688B (en) 2020-04-24 2020-04-24 Method for generating and verifying identity based on environment perception

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010332031.2A CN111586688B (en) 2020-04-24 2020-04-24 Method for generating and verifying identity based on environment perception

Publications (2)

Publication Number Publication Date
CN111586688A CN111586688A (en) 2020-08-25
CN111586688B true CN111586688B (en) 2023-12-05

Family

ID=72111682

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010332031.2A Active CN111586688B (en) 2020-04-24 2020-04-24 Method for generating and verifying identity based on environment perception

Country Status (1)

Country Link
CN (1) CN111586688B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910652B (en) * 2021-01-18 2022-11-08 湖南海格力士智能科技有限公司 Remote controller identification method and remote controller identification device
CN115834635A (en) * 2022-12-06 2023-03-21 国网福建省电力有限公司 Remote operation and maintenance management system for dispatching equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236927A (en) * 2013-04-16 2013-08-07 中国科学技术大学 Dynamic-identification-based authentication method and system
WO2014201830A1 (en) * 2013-06-20 2014-12-24 Tencent Technology (Shenzhen) Company Limited Method and device for detecting software-tampering

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103236927A (en) * 2013-04-16 2013-08-07 中国科学技术大学 Dynamic-identification-based authentication method and system
WO2014201830A1 (en) * 2013-06-20 2014-12-24 Tencent Technology (Shenzhen) Company Limited Method and device for detecting software-tampering

Also Published As

Publication number Publication date
CN111586688A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US11076290B2 (en) Assigning an agent device from a first device registry to a second device registry
US9860235B2 (en) Method of establishing a trusted identity for an agent device
CN102414689B (en) For improvement of the method and apparatus of code and data signing
CN1172224C (en) Method and device for authenticating a program code
EP2779524A1 (en) Secure data transmission method, device and system
CN105530253B (en) Wireless sensor network access authentication method under Restful framework based on CA certificate
GB2530028A (en) Registry apparatus, agent device, application providing apparatus and corresponding methods
WO2015056009A1 (en) Method of establishing a trusted identity for an agent device
CN110708164B (en) Control method and device for Internet of things equipment, storage medium and electronic device
CN111586688B (en) Method for generating and verifying identity based on environment perception
KR20060056279A (en) Apparatus authentication system
CN108171019B (en) Anti-counterfeiting verification method, anti-counterfeiting verification system, anti-counterfeiting verification device and storage medium
CN110958239B (en) Method and device for verifying access request, storage medium and electronic device
KR20110031752A (en) Method and apparatus for detecting sybil attack node using localization information and hash chain in ubiquitous sensor networks
CN108111303A (en) A kind of secure connection method of intelligent home gateway
CN114189863A (en) Binding method and device of intelligent door lock, storage medium and electronic device
CN106954216B (en) Authentication method and system based on 802.1X protocol
CN117240453A (en) Data transmission method, device, equipment and storage medium
CN115514470A (en) Storage method and system for community correction data security
JP2005259028A (en) User device, program for user device, authentication system and program
CN115242440B (en) Block chain-based internet of things equipment trusted calling method, device and equipment
CN114444093B (en) Data security encryption method, device, equipment and computer readable storage medium
CN114244616B (en) Login verification method, login verification system, electronic device and storage medium
WO2016158908A1 (en) Network communication method and network communication system
CN114301774B (en) Device configuration method, system, device, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant