CN112564894A - Method for unlocking passive lock by intelligent key dynamic secret key - Google Patents

Method for unlocking passive lock by intelligent key dynamic secret key Download PDF

Info

Publication number
CN112564894A
CN112564894A CN202011253689.0A CN202011253689A CN112564894A CN 112564894 A CN112564894 A CN 112564894A CN 202011253689 A CN202011253689 A CN 202011253689A CN 112564894 A CN112564894 A CN 112564894A
Authority
CN
China
Prior art keywords
key
passive lock
authentication
dynamic
mme
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011253689.0A
Other languages
Chinese (zh)
Inventor
吴小松
颜飞勇
吴滨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinhua Xingu Technology Co ltd
Hangzhou Zhecheng Technology Co ltd
Original Assignee
Jinhua Xingu Technology Co ltd
Hangzhou Zhecheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinhua Xingu Technology Co ltd, Hangzhou Zhecheng Technology Co ltd filed Critical Jinhua Xingu Technology Co ltd
Priority to CN202011253689.0A priority Critical patent/CN112564894A/en
Publication of CN112564894A publication Critical patent/CN112564894A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides a method for unlocking a passive lock by using an intelligent key dynamic secret key, and relates to the technical field of intelligent door locks. The method for unlocking the passive lock by the intelligent key dynamic secret key comprises the following steps: s1, the key management user establishes a communication system by using the APP software and the intelligent key hardware, and authorizes the information of the passive lock device to the intelligent key hardware; and S2, the passive lock host generates a registration key. The passive lock receives an unlocking instruction with the dynamic secret key, and then the passive lock calculates whether the dynamic secret key is correct through the same algorithm, and only after the dynamic secret key is completely correct, the motor can be rotated to unlock the passive lock.

Description

Method for unlocking passive lock by intelligent key dynamic secret key
Technical Field
The invention relates to the technical field of intelligent door locks, in particular to a method for unlocking a passive lock by using an intelligent key dynamic secret key.
Background
At present, with the continuous improvement of living standard of people, more and more attention is paid to security measures, and the household field and the automobile field become important components of security, for example, most of the existing coded locks used for door locks, automobile door locks, safe box door locks, etc. are traditional mechanical coded locks, electronic coded locks, fingerprint locks, etc., and intelligent keys and passive locks are widely applied in the industries of banks, electric power, telecommunication operators, etc., when the existing intelligent keys are used for unlocking, firstly, the intelligent keys power on the padlocks, and simultaneously, the key of the lock (or the serial number of the lock) is read through a serial port or other communication modes, and when the key of the lock exists in the key, the key will issue an unlocking instruction, but the unlocking instruction is a fixed command and is easy to be cracked, the fingerprint of the fingerprint lock can be technically copied, and the like, so that the traditional mechanical coded lock, the electronic coded lock, the fingerprint lock and the like have the safety problem of password leakage in the using process.
Disclosure of Invention
The present invention provides a method for unlocking a passive lock by using a dynamic key of a smart key, which solves the above problems in the prior art.
In order to achieve the purpose, the invention is realized by the following technical scheme: a method for unlocking a passive lock by using a dynamic key of an intelligent key comprises the following steps:
and S1, the key management user establishes a communication system by using the APP software and the intelligent key hardware, and authorizes the information of the passive lock device to the intelligent key hardware.
And S2, the passive lock host generates a registration key and sends the registration key to the intelligent key.
S3, when the key of the passive lock is read by the smart key and the key is output by the passive lock, a random number with several bytes is added.
S4, after the smart key receives the data authentication, a dynamic key is calculated through an algorithm, and when the instruction is issued, the instruction of the dynamic key is added.
S5, after the passive lock receives the unlocking instruction with the dynamic secret key, the same algorithm is used to calculate whether the dynamic secret key is correct, and the motor can be rotated to unlock the passive lock only if the dynamic secret key is completely correct.
Further, the communication system is for AS security at the AS layer and NAS security at the NAS layer.
Further, the AS layer is security between the UE and the eNB, including confidentiality protection, integrity protection, and user plane confidentiality protection of RRC signaling, and the NAS security is security between the UE and the MME, including confidentiality protection and integrity protection of NAS signaling.
Further, in the operation step in S4, the data authentication includes an authentication vector, and the authentication vector includes four parameters, which are RAND, AUTN, XRES, and KASME, respectively.
Further, in the operation step in S4, the data authentication further includes the steps of:
s401, UE sends identity information such as IMSI of the UE and IDHSS identification of HSS to MME to request access;
s402, MME sends an authentication data request to corresponding HSS according to the request IDHSS, wherein the request comprises the identity information IMSI of the user and the identity information SNID of the service network;
s403, after the HSS receives the authentication request, searching IMSI and SNID in a database of the HSS, verifying the legality of the two entities, and if the verification is passed, generating an authentication vector group AV;
s404, the HSS takes the generated authentication vector set AV as authentication data response and sends the authentication vector set AV back to the MM;
s405, after receiving the response, the MME stores the AV, selects one AV from the AV, extracts data such as RAND, AUTN, KASME and the like, and allocates a key identifier KSIASME for the KASME;
s406, the MME sends a user authentication request to the UE, wherein the user authentication request contains data such as RAND, AUTN, KASME and the like;
s407, after the UE receives the authentication request, XMAC is calculated by extracting and calculating information such as MAC in AUTN, and the XMAC and the MAC are compared to be equal, and whether the sequence number SQN is in a normal range is checked at the same time, so that the accessed network is authenticated;
s408, the UE sends a user authentication request response message to the MME and transmits the calculated RES to the MME;
s409, the MME compares the received RES with the XRES in the AV, and if the RES is consistent with the XRES, the authentication is passed;
s4010, after the bidirectional authentication is completed, the MME and the UE use KASME as a basic key, derive an encryption key CK and an integrity protection key IK according to an agreed algorithm, and then carry out secret communication.
Furthermore, integrity protection and encryption control should be performed after the data authentication is completed.
The invention provides a method for unlocking a passive lock by using a dynamic secret key of an intelligent key. The method has the following beneficial effects:
the method for unlocking the passive lock by the intelligent key dynamic secret key is characterized in that when the intelligent key reads the secret key (or serial number) of the passive lock and the passive lock outputs the secret key, a random number with a plurality of bytes is added, after the intelligent key receives data authentication, a dynamic secret key is calculated through an algorithm, when an instruction is issued, an instruction of the dynamic secret key is added, after the passive lock receives an unlocking instruction with the dynamic secret key, whether the dynamic secret key is correct or not is calculated through the same algorithm, and only when the dynamic secret key is completely correct, the motor can be rotated to unlock the passive lock.
Drawings
FIG. 1 is a diagram of an algorithm for generating authentication vectors in accordance with the present invention;
FIG. 2 is an algorithm diagram of the present invention.
Detailed Description
Example 1: referring to FIGS. 1-2: the invention provides a method for unlocking a passive lock by using an intelligent key dynamic secret key, which comprises the following steps:
step one, a key management user uses APP software and intelligent key hardware to establish a communication system, information of passive lock equipment is authorized to the intelligent key hardware, the communication system aims at AS safety of an AS layer and NAS safety of an NAS layer, the AS layer is safety between UE and eNB and comprises confidentiality protection, integrity protection and user plane confidentiality protection of RRC signaling, and the NAS safety is safety between the UE and MME and comprises the confidentiality protection and integrity protection of the NAS signaling.
And step two, the passive lock host generates a registration key and sends the registration key to the intelligent key, and the passive lock host and the intelligent key can be in communication connection through wireless low frequency and wireless high frequency combination or Bluetooth or WIFI.
Step three, when the intelligent key reads the secret key of the passive lock, and the passive lock outputs the secret key, a random number with a plurality of bytes is added, and the secret key (serial number) with the random number is sent as follows:
Figure BDA0002772429610000041
the passive lock side generates a random number g _ c16random, which is generated in the system clock as follows:
voidSysTick_Handler(void)
{g_c16random++;
if(g_c16random==0xffff)
g_c16random=0}。
key side: as follows
Figure BDA0002772429610000051
And step four, after the intelligent key receives the data authentication, calculating a dynamic key through an algorithm, and adding the instruction of the dynamic key when issuing the instruction, wherein the data authentication comprises an authentication vector, and the authentication vector comprises four parameters, namely RAND, AUTN, XRES and KASME.
The data authentication further comprises the following steps:
1) the UE sends identity information such as the IMSI of the UE and the IDHSS of the HSS to the MME to request access;
2) the MME sends an authentication data request to a corresponding HSS according to the request IDHSS, wherein the request comprises the identity information IMSI of the user and the identity information SNID of the service network;
3) after receiving the authentication request, HSS searches IMSI and SNID in its own database, verifies the validity of the two entities, and if the verification is passed, generates authentication vector group AV;
4) HSS sends the generated authentication vector group AV as authentication data response back to MM, and the algorithm for generating authentication vector is shown in figure 1;
5) after receiving the response, the MME stores the AV, selects one AV from the AV, extracts data such as RAND, AUTN, KASME and the like, and distributes a key identification KSIASME for the KASME;
6) the MME sends a user authentication request to the UE, wherein the user authentication request contains data such as RAND, AUTN, KASME and the like;
7) after receiving the authentication request, the UE calculates XMAC by extracting and calculating information such as MAC in AUTN, compares whether XMAC and MAC are equal, and simultaneously checks whether the sequence number SQN is within a normal range, so as to authenticate the accessed network, wherein the algorithm is shown in figure 2;
8) UE sends user authentication request response message to MME and transmits calculated RES to MME;
9) the MME compares the received RES with the XRES in the AV, and if the RES is consistent with the XRES, the authentication is passed;
10) and after the bidirectional authentication is completed, the MME and the UE use the KASME as a basic key, derive an encryption key CK and an integrity protection key IK according to an agreed algorithm, and then carry out secret communication.
And after the data authentication is finished, integrity protection and encryption control are carried out, and the SMC is used for activating the safe interaction of information between the terminal and the network side and comprises two parts, namely an NAS SMC and an AS SMC. The Security Mode control mainly includes two signaling of the Security Mode Command sent to the UE by the network side and the Security Mode Complete replied to the network side by the UE. The SMC process mainly completes the negotiation of the terminal and the network side to the used security algorithm, generates the key required by the corresponding security algorithm based on KASME or KeNB, and initiates the secure interaction of the messages between the network side and the terminal.
In fact, the connection establishment of the message security interaction mainly comprises the following processes:
1. the RRC connection is established while SRB1(SRB, Signalling Radio Bearer) is also established.
2. The NAS connection is established.
3. And initiating an AKA process to complete the negotiation of bidirectional authentication and a common basic key KASME between the UE and the network side, wherein 1) to 10) in the above.
4. And initiating a NAS Security Mode Control (SMC) flow, activating a NAS security mechanism, and performing security protection on the subsequently interacted NAS messages.
5. And initiating an AS Security Mode Control (SMC) flow, activating an AS security mechanism, and performing security protection on the subsequent interactive RRC message.
Step five, after the passive lock receives an unlocking instruction with the dynamic secret key, the passive lock calculates whether the dynamic secret key is correct through the same algorithm, and the motor can be rotated to unlock the passive lock only if the dynamic secret key is completely correct;
judging whether the dynamic key is correct: as follows
Figure BDA0002772429610000071
Figure BDA0002772429610000081
In the invention, when the intelligent key reads the secret key (or serial number) of the passive lock, and the passive lock outputs the secret key, a random number with a plurality of bytes is added, after the intelligent key receives data authentication, a dynamic secret key is calculated through an algorithm, when an instruction is issued, an instruction of the dynamic secret key is added, after the passive lock receives an unlocking instruction with the dynamic secret key, whether the dynamic secret key is correct is calculated through the same algorithm, and only when the dynamic secret key is completely correct, the motor can be rotated to unlock the lock, because the random number and the dynamic secret key are different every time, the unlocking instruction of the passive lock can not be unlocked generally, and in the use, the password can be effectively prevented from being cracked, and the security of the password is improved.
The above is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, many variations and modifications can be made without departing from the inventive concept of the present invention, which falls into the protection scope of the present invention.

Claims (6)

1. A method for unlocking a passive lock by using a dynamic key of an intelligent key is characterized by comprising the following steps:
s1, the key management user establishes a communication system by using the APP software and the intelligent key hardware, and authorizes the information of the passive lock device to the intelligent key hardware;
s2, the passive lock host generates a registration key and sends the registration key to the intelligent key;
s3, when the key of the passive lock is read by the intelligent key and the key is output by the passive lock, a random number with a plurality of bytes is added;
s4, after the intelligent key receives the data authentication, calculating a dynamic secret key through an algorithm, and adding the instruction of the dynamic secret key when issuing the instruction;
s5, after the passive lock receives the unlocking instruction with the dynamic secret key, the same algorithm is used to calculate whether the dynamic secret key is correct, and the motor can be rotated to unlock the passive lock only if the dynamic secret key is completely correct.
2. A method of smart key dynamic key unlocking a passive lock according to claim 1, wherein in the operation step of S1, the communication system is directed to AS security of AS layer and NAS security of NAS layer.
3. A method of smart key dynamic key unlocking a passive lock according to claim 2, wherein the AS layer is security between the UE and the eNB, including confidentiality protection, integrity protection and user plane confidentiality protection of RRC signaling, and the NAS security is security between the UE and the MME, including confidentiality protection and integrity protection of NAS signaling.
4. A method for a smart key dynamic key unlocking passive lock as claimed in claim 1, wherein in the operation step of S4, said data authentication includes an authentication vector, said authentication vector includes four parameters, RAND, AUTN, XRES and KASME respectively.
5. The method for unlocking a passive lock by using a dynamic key of a smart key as claimed in claim 1, wherein in the operation step of S4, the data authentication further comprises the steps of:
s401, UE sends identity information such as IMSI of the UE and IDHSS identification of HSS to MME to request access;
s402, MME sends an authentication data request to corresponding HSS according to the request IDHSS, wherein the request comprises the identity information IMSI of the user and the identity information SNID of the service network;
s403, after the HSS receives the authentication request, searching IMSI and SNID in a database of the HSS, verifying the legality of the two entities, and if the verification is passed, generating an authentication vector group AV;
s404, the HSS takes the generated authentication vector set AV as authentication data response and sends the authentication vector set AV back to the MM;
s405, after receiving the response, the MME stores the AV, selects one AV from the AV, extracts data such as RAND, AUTN, KASME and the like, and allocates a key identifier KSIASME for the KASME;
s406, the MME sends a user authentication request to the UE, wherein the user authentication request contains data such as RAND, AUTN, KASME and the like;
s407, after the UE receives the authentication request, XMAC is calculated by extracting and calculating information such as MAC in AUTN, and the XMAC and the MAC are compared to be equal, and whether the sequence number SQN is in a normal range is checked at the same time, so that the accessed network is authenticated;
s408, the UE sends a user authentication request response message to the MME and transmits the calculated RES to the MME;
s409, the MME compares the received RES with the XRES in the AV, and if the RES is consistent with the XRES, the authentication is passed;
s4010, after the bidirectional authentication is completed, the MME and the UE use KASME as a basic key, derive an encryption key CK and an integrity protection key IK according to an agreed algorithm, and then carry out secret communication.
6. A method as claimed in claim 5, wherein integrity protection and encryption control are performed after the data authentication is completed.
CN202011253689.0A 2020-11-11 2020-11-11 Method for unlocking passive lock by intelligent key dynamic secret key Pending CN112564894A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011253689.0A CN112564894A (en) 2020-11-11 2020-11-11 Method for unlocking passive lock by intelligent key dynamic secret key

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011253689.0A CN112564894A (en) 2020-11-11 2020-11-11 Method for unlocking passive lock by intelligent key dynamic secret key

Publications (1)

Publication Number Publication Date
CN112564894A true CN112564894A (en) 2021-03-26

Family

ID=75041940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011253689.0A Pending CN112564894A (en) 2020-11-11 2020-11-11 Method for unlocking passive lock by intelligent key dynamic secret key

Country Status (1)

Country Link
CN (1) CN112564894A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113668961A (en) * 2021-08-17 2021-11-19 苏州双项信息科技有限公司 Key distribution device convenient to operate and method thereof
CN114724291A (en) * 2022-03-28 2022-07-08 北京呈创科技股份有限公司 Remote offline real-time authorization method and device for access control system and storage medium
CN117475536A (en) * 2023-09-29 2024-01-30 国网江苏省电力有限公司宿迁供电分公司 Passive wireless intelligent lockset system for electric cabinet door and unlocking method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511084A (en) * 2008-02-15 2009-08-19 中国移动通信集团公司 Authentication and cipher key negotiation method of mobile communication system
CN102783080A (en) * 2010-01-06 2012-11-14 阿尔卡特朗讯公司 Secure multi -UIM authentication and key exchange
CN104754581A (en) * 2015-03-24 2015-07-01 河海大学 Public key password system based LTE wireless network security certification system
CN105184929A (en) * 2015-09-30 2015-12-23 深圳市章陈融通科技有限公司 Intelligent door lock control method and device
CN105635089A (en) * 2014-11-28 2016-06-01 珠海汇金科技股份有限公司 Authentication method, unlocking method and unlocking system for dynamic password lock
CN106162626A (en) * 2015-04-20 2016-11-23 北京信威通信技术股份有限公司 Group communication is eated dishes without rice or wine the methods, devices and systems of security control
CN107295508A (en) * 2017-07-27 2017-10-24 武汉虹信通信技术有限责任公司 A kind of LTE network entity authentication and key updating method
WO2020154922A1 (en) * 2019-01-29 2020-08-06 华为技术有限公司 Intelligent lock control method and apparatus
CN111815814A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and binding authentication method thereof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101511084A (en) * 2008-02-15 2009-08-19 中国移动通信集团公司 Authentication and cipher key negotiation method of mobile communication system
CN102783080A (en) * 2010-01-06 2012-11-14 阿尔卡特朗讯公司 Secure multi -UIM authentication and key exchange
CN105635089A (en) * 2014-11-28 2016-06-01 珠海汇金科技股份有限公司 Authentication method, unlocking method and unlocking system for dynamic password lock
CN104754581A (en) * 2015-03-24 2015-07-01 河海大学 Public key password system based LTE wireless network security certification system
CN106162626A (en) * 2015-04-20 2016-11-23 北京信威通信技术股份有限公司 Group communication is eated dishes without rice or wine the methods, devices and systems of security control
CN105184929A (en) * 2015-09-30 2015-12-23 深圳市章陈融通科技有限公司 Intelligent door lock control method and device
CN107295508A (en) * 2017-07-27 2017-10-24 武汉虹信通信技术有限责任公司 A kind of LTE network entity authentication and key updating method
WO2020154922A1 (en) * 2019-01-29 2020-08-06 华为技术有限公司 Intelligent lock control method and apparatus
CN111815814A (en) * 2020-06-22 2020-10-23 北京智辉空间科技有限责任公司 Electronic lock security system and binding authentication method thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
邓亚平;付红;谢显中;张玉成;石晶林;: "基于公钥体制的3GPP认证与密钥协商协议", 计算机应用 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113668961A (en) * 2021-08-17 2021-11-19 苏州双项信息科技有限公司 Key distribution device convenient to operate and method thereof
CN114724291A (en) * 2022-03-28 2022-07-08 北京呈创科技股份有限公司 Remote offline real-time authorization method and device for access control system and storage medium
CN114724291B (en) * 2022-03-28 2023-12-12 北京呈创科技股份有限公司 Remote offline real-time authorization method and device for access control system and storage medium
CN117475536A (en) * 2023-09-29 2024-01-30 国网江苏省电力有限公司宿迁供电分公司 Passive wireless intelligent lockset system for electric cabinet door and unlocking method

Similar Documents

Publication Publication Date Title
CN108055235B (en) Control method of intelligent lock, related equipment and system
CN107978047B (en) Use the methods, devices and systems of password unlocking
CN101212296B (en) Certificate and SIM based WLAN access authentication method and system
US7370350B1 (en) Method and apparatus for re-authenticating computing devices
CN112564894A (en) Method for unlocking passive lock by intelligent key dynamic secret key
CN107959686B (en) A kind of Internet of Things security certification system and authentication method
CN101500229B (en) Method for establishing security association and communication network system
EP2296392A1 (en) Authentication method, re-certification method and communication device
CN110334503A (en) The method for unlocking another equipment using an equipment
WO2017185913A1 (en) Method for improving wireless local area network authentication mechanism
EP2384038B1 (en) Method and system for realizing network locking and unlocking by a terminal device
CN110545252B (en) Authentication and information protection method, terminal, control function entity and application server
CN103688563A (en) Performing a group authentication and key agreement procedure
CN101931955A (en) Authentication method, device and system
CN109920100B (en) Unlocking method and system of intelligent lock
CN114268943A (en) Authorization method and device
CN100456884C (en) Re-identifying method in wireless communication system
CN108932771A (en) A kind of long-range temporary Authorization, method for unlocking and system
CN114765534B (en) Private key distribution system and method based on national secret identification cryptographic algorithm
WO2012171284A1 (en) Method and device for third-party authentication and smart card supporting bidirectional authentication
CN101192927B (en) Authorization based on identity confidentiality and multiple authentication method
EP3506137A1 (en) User authentication at an offline secured object
CN101895881A (en) Method for realizing GBA secret key and pluggable equipment of terminal
CN107786978B (en) NFC authentication system based on quantum encryption
CN107888376B (en) NFC authentication system based on quantum communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination