CN112738052A - Authentication method between devices, storage medium and electronic device - Google Patents
Authentication method between devices, storage medium and electronic device Download PDFInfo
- Publication number
- CN112738052A CN112738052A CN202011548819.3A CN202011548819A CN112738052A CN 112738052 A CN112738052 A CN 112738052A CN 202011548819 A CN202011548819 A CN 202011548819A CN 112738052 A CN112738052 A CN 112738052A
- Authority
- CN
- China
- Prior art keywords
- authentication
- communication
- key
- random number
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0869—Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The utility model provides an authentication method, storage medium and electronic equipment between equipment, based on the corresponding key that sets up in advance between two equipment, carry out mutual encryption authentication to the information of equipment, only can carry out subsequent data communication after both sides' authentication passes through to avoid appearing carrying out illegal data transmission through modes such as monitoring communication interface or simulation fingerprint communication protocol, and then promote the security of communication between the equipment, promote the use experience of user in the in-process of using equipment.
Description
Technical Field
The present disclosure relates to the field of authentication technologies, and in particular, to an authentication method between devices, a storage medium, and an electronic device.
Background
Data communication is usually performed between a plurality of electronic devices through a Serial port, a Serial Peripheral Interface (SPI) or a Universal Serial Bus (USB), taking an intelligent door lock with a fingerprint identification function as an example, a fingerprint module of the intelligent door lock acquires a fingerprint of a user and sends the fingerprint to a door lock host for identification. The security of the fingerprint module has very large potential safety hazards, the fingerprint module is generally placed outside a door on an intelligent door lock, if an attacker takes off the fingerprint module, the fingerprint identification module can be directly skipped through monitoring a communication interface or simulating a fingerprint communication protocol, the added fingerprint number is directly sent to a host, the host can execute door opening action, or the algorithm is broken through acquiring the firmware of the fingerprint module, and then the personal safety and the property safety of a user are seriously threatened.
Disclosure of Invention
In order to solve the above problem, an object of the embodiments of the present disclosure is to provide an inter-device authentication method, a storage medium, and an electronic device.
The embodiment of the disclosure adopts the following technical scheme: an authentication method between devices is applied to a first device and comprises the following steps: receiving an authentication binding request sent by a second device, wherein the authentication binding request at least comprises: a second string composed of the ID of the second device, a second random number, and a timestamp, and a second authentication code, where the second authentication code is obtained by encrypting, by the second device, the ID of the second device, the second random number, and the timestamp based on a second key; decrypting the second authentication code according to the first key to obtain a first decryption result; and under the condition that the first decryption result is the same as the second character string, storing the second character string and sending an authentication feedback request to the second equipment, wherein the authentication feedback request at least comprises: the ID of the first device, a first random number and a first authentication code are obtained by encrypting a first character string consisting of the ID of the first device, the first random number, the ID of the second device, the second random number and the timestamp based on the first key; when receiving an authentication success message sent by the second device, determining that the first device and the second device pass authentication; wherein the first key corresponds to the second key.
Further, after determining that the first device and the second device are authenticated, the method further includes: and sending communication data to the second equipment or receiving the communication data sent by the second equipment when the time difference between the current time and the timestamp is within a preset authentication time.
Further, after determining that the first device and the second device are authenticated, the method further includes: sending first communication data to the second device, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content based on the first key.
Further, after determining that the first device and the second device are authenticated, the method further includes: receiving second communication data sent by the second device, wherein the second communication data at least comprises: the second communication content and a second communication code, wherein the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key; decrypting the second communication code based on the first key to obtain a third decryption result; and determining that the second communication data passes authentication and executing the second communication content when the third decryption result is the same as the ID of the first device, the first random number and the second communication content.
The embodiment of the present disclosure further provides an authentication method between devices, which is applied to a second device, and includes: sending an authentication binding request to a first device, the authentication binding request comprising at least: a second string composed of the ID of the second device, a second random number, and a timestamp, and a second authentication code, where the second authentication code is obtained by encrypting the ID of the second device, the second random number, and the timestamp based on a second key; receiving an authentication feedback request sent by the second device, wherein the authentication feedback request at least comprises: the ID of the first device, a first random number and a first authentication code, wherein the first authentication code is obtained by encrypting a first character string consisting of the ID of the first device, the first random number, the ID of the second device, the second random number and the timestamp by the first device based on the first key; decrypting the first authentication code according to the second key to obtain a second decryption result; under the condition that the second decryption result is the same as the first character string, storing the ID of the first equipment and the first random number, and sending an authentication success message to the first equipment; wherein the first key corresponds to the second key.
Further, after sending the authentication success message to the first device, the method further includes: receiving first communication data sent by the first device, wherein the first communication data at least comprises: the first communication content and a first communication code are obtained by the first device after encrypting the second character string and the first communication content based on the first key; decrypting the first communication code according to the second key to obtain a fourth decryption result; and when the fourth decryption result is the same as the second character string and the first communication content, determining that the first communication data passes authentication, and executing the first communication content.
Further, after sending the authentication success message to the first device, the method further includes: sending second communication data to the first device, wherein the second communication data at least comprises: and the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key.
Further, after sending the authentication success message to the first device, the method further includes: detecting whether the time difference between the current time and the timestamp exceeds a preset authentication time or not; and under the condition that the time difference exceeds the preset authentication time, re-authenticating the first equipment and the second equipment.
Embodiments of the present disclosure also provide a storage medium having a computer program stored thereon, where the computer program is executed by a processor to perform the steps of the above-mentioned inter-device authentication method.
The embodiment of the present disclosure further provides an electronic device, which at least includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the above-mentioned inter-device authentication method when executing the computer program on the memory.
The beneficial effects of this disclosed embodiment lie in: based on the corresponding secret key preset between the two devices, the information of the devices is encrypted and authenticated mutually, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of users in the process of using the devices is improved.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present disclosure, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of an inter-device authentication method implemented by a first device in a first embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a method for performing security verification on communication data implemented by a first device in a first embodiment of the present disclosure;
fig. 3 is a flowchart of an inter-device authentication method implemented by a second device in a second embodiment of the present disclosure;
fig. 4 is a flowchart illustrating a method for performing security verification on communication data implemented by a second device according to a second embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device in a fifth embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of an electronic device in a sixth embodiment of the present disclosure.
Detailed Description
Various aspects and features of the disclosure are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Other modifications will occur to those skilled in the art within the scope and spirit of the disclosure.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the present disclosure will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present disclosure has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of the disclosure, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and structures have not been described in detail so as not to obscure the present disclosure with unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
Data communication is usually performed between a plurality of electronic devices through a serial port, an SPI, or a USB. Taking an intelligent door lock with a fingerprint identification function as an example, the fingerprint module acquires the fingerprint of a user and sends the fingerprint to the door lock host for identification. The security of the fingerprint module has very large potential safety hazards, the fingerprint module is generally placed outside a door on an intelligent door lock, if an attacker takes off the fingerprint module, the fingerprint identification module can be directly skipped through monitoring a communication interface or simulating a fingerprint communication protocol, the added fingerprint number is directly sent to a host, the host can execute door opening action, or the algorithm is broken through acquiring the firmware of the fingerprint module, and then the personal safety and the property safety of a user are seriously threatened.
In order to solve the above problem, a first embodiment of the present disclosure provides an inter-device authentication method, for example, between a first device and a second device, and the present embodiment mainly describes the authentication method in terms of the first device. It should be noted that, in the embodiment of the present disclosure, an intelligent door lock with a fingerprint module and a door lock host is taken as an example, where the fingerprint module is a first device, the door lock host is a second device, and a flowchart of an authentication method, which is first implemented by the fingerprint module before performing communication of fingerprint data with the door lock host, is shown in fig. 1, and mainly includes steps S101 to S104:
s101, receiving an authentication binding request sent by the second device.
In actual use, the fingerprint module and the door lock host are usually configured in a matching manner, that is, one door lock host has a unique fingerprint module corresponding to the fingerprint module, the fingerprint module collects fingerprint information of a user, and the door lock host performs comparison or identification based on the fingerprint information and determines whether to unlock the door lock based on an identification result. Therefore, when factory setting is performed on the first device and the second device, a first key and a second key corresponding to each other are usually set in the first device and the second device, where the first key and the second key may be the same symmetric key or asymmetric keys that are a public key and a private key of each other.
When the second device sends an authentication binding request to the first device, the content in the authentication binding request at least comprises: the second device comprises a second character string and a second authentication code, wherein the second character string is composed of an ID of the second device, a second random number and a timestamp, the ID of the second device is a unique machine code of the second device, the second random number is a character string randomly generated by the second device, the timestamp is a timestamp when the authentication binding request is sent, the second character string is composed of the ID of the second device, the second random number and the timestamp based on a preset sequence, and the second authentication code is obtained by encrypting the second character string and the timestamp by the second device based on a second secret key stored in the second device.
In the process of generating the second authentication code by the second device, a binding instruction may be further included in the second character string, so as to clarify to the first device that the function of the second authentication code is for authentication binding.
S102, the second authentication code is decrypted according to the first secret key to obtain a first decryption result.
And after receiving the authentication binding request sent by the second equipment, the first equipment decrypts the second authentication code based on the first secret key stored by the first equipment so as to obtain a first decryption result.
And S103, storing the second character string and sending an authentication feedback request to the second device under the condition that the first decryption result is the same as the second character string.
Since the first key and the second key are the same or matched keys, the second authentication code obtained by encrypting based on the second key can be decrypted by using the first key which is the same or matched with the second key, and under the condition that the first decryption result obtained by decrypting is the same as the second character string, the first device can determine that the second device is the corresponding device configured when the second device leaves the factory, at this time, the specific content of the second character string is stored, and an authentication feedback request is sent to the second device, so that the second device can perform self identity authentication.
The authentication feedback request at least comprises an ID of the first device, a first random number and a first authentication code, the ID of the first device is a machine code unique to the first device, the first random number is a character string randomly generated by the first device, the character string can be the same as or different from a second random number, and the first authentication code is a character string obtained by encrypting the first character string by the first device based on a first secret key, wherein the first character string is composed of the ID of the first device, the first random number, the ID of the second device, the second random number and a timestamp according to a preset sequence.
S104, when receiving the authentication success message sent by the second device, determining that the first device and the second device pass the authentication.
After receiving the authentication feedback request sent by the first device, the second device decrypts and compares the first authentication code based on the same principle, if the second device successfully authenticates the first device, the second device sends an authentication success message to the first device, and after receiving the authentication success message, the first device determines that the first device and the second device pass authentication, so that the secure communication can be realized on the basis.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
Further, in the present embodiment, the timestamp of the authentication binding request initiated by the second device is interacted and encrypted in the authentication process, which is intended to limit the valid time of the authentication between the devices, for example, the valid time is set to two hours, and when the first device and the second device communicate with each other, only if the time difference between the current time and the time corresponding to the timestamp is within the preset authentication time, that is, within two hours, the data communication between the first device and the second device can be implemented.
When it is determined that data interaction is actually performed after the first device and the second device are authenticated, the first device may send first communication data to the second device, where the first communication data at least includes first communication content and a first communication code, the first communication content is data that the first device actually needs to send to the second device, for example, when the first device is a fingerprint module, the first communication content is fingerprint information of a user acquired by the fingerprint module, and the first communication code is a character string obtained by the first device by encrypting the second character string and the first communication content based on the first key, and is mainly used for security authentication of the second device.
When the first device receives the communication data sent by the second device, it also needs to perform security verification on the communication data, and at this time, the flow chart of the correspondingly implemented method is shown in fig. 2, and mainly includes steps S201 to S203:
s201, receiving second communication data sent by the second device.
Specifically, the second communication data at least includes second communication content and a second communication code, where the second communication content is data that the second device actually needs to send to the first device, such as an acquisition instruction, an addition or deletion instruction, and the second communication code is a character string obtained by the second device encrypting the ID of the first device, the first random number, and the second communication content based on the second key.
S202, the second communication code is decrypted based on the first key to obtain a third decryption result.
S203, in case that the third decryption result is the same as the ID of the first device, the first random number, and the second communication content, determining that the second communication data is authenticated, and executing the second communication content.
Since the first key and the second key are the same or matched keys, the second communication code obtained by encrypting based on the second key can be decrypted by using the first key which is the same or matched with the second key, and the first device can determine that the second communication data passes the authentication and execute the second communication content under the condition that a third decryption result obtained by decrypting is the same as a character string formed by the ID of the first device, the first random number and the second communication content according to a preset sequence.
In this embodiment, on the basis that the mutual authentication of the first device and the second device is passed, security authentication on communication content is also realized based on the encrypted communication code during data communication, and the security of data transmission between devices is further improved.
A second embodiment of the present disclosure also discloses an authentication method between devices, which is different from the first embodiment in that the second embodiment is described in terms of a second device, taking an intelligent door lock with a fingerprint module and a door lock host as an example, the second embodiment is a method for performing authentication between the door lock host and the fingerprint module, a flowchart of which is shown in fig. 3, and mainly includes steps S301 to S304:
s301, sending an authentication binding request to the first device.
When the second device sends an authentication binding request to the first device, the content in the authentication binding request at least comprises: the second device comprises a second character string and a second authentication code, wherein the second character string is composed of an ID of the second device, a second random number and a timestamp, the ID of the second device is a unique machine code of the second device, the second random number is a character string randomly generated by the second device, the timestamp is a timestamp when the authentication binding request is sent, the second character string is composed of the ID of the second device, the second random number and the timestamp based on a preset sequence, and the second authentication code is obtained by encrypting the second character string and the timestamp by the second device based on a second secret key stored in the second device.
In the process of generating the second authentication code by the second device, a binding instruction may be further included in the second character string, so as to clarify to the first device that the function of the second authentication code is for authentication binding.
S302, an authentication feedback request sent by the second device is received.
After receiving an authentication binding request sent by a second device, a first device authenticates the authentication binding request with reference to steps S102 and S103 in the first embodiment, and generates an authentication feedback request after the authentication is passed, where the authentication feedback request at least includes an ID of the first device, a first random number, and a first authentication code, the ID of the first device is a machine code unique to the first device, the first random number is a character string randomly generated by the first device, and may be the same as or different from a second random number, and the first authentication code is a character string obtained by encrypting, by the first device, the first character string based on a first key, where the first character string is composed of the ID of the first device, the first random number, the ID of the second device, the second random number, and a timestamp in a predetermined order.
S303, the first authentication code is decrypted according to the second key to obtain a second decryption result.
And after receiving the authentication feedback request sent by the first equipment, the second equipment decrypts the first authentication code based on the second key stored by the second equipment so as to obtain a second decryption result.
And S304, under the condition that the second decryption result is the same as the first character string, storing the ID and the first random number of the first device, and sending an authentication success message to the first device.
Since the first key and the second key are the same or matched keys, the first authentication code obtained by encrypting based on the first key can be decrypted by using the second key which is the same or matched with the first key, and under the condition that the second decryption result obtained by decrypting is the same as the first character string, the second device can determine that the first device is the corresponding device configured when the first device leaves the factory, at the moment, the ID and the first random number of the first device are stored, and an authentication success message is sent to the first device to inform that the first device passes the authentication, so that the secure communication can be realized on the basis.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
Further, in the present embodiment, the timestamp of the authentication binding request initiated by the second device is interacted and encrypted in the authentication process, which is intended to limit the valid time of the authentication between the devices, for example, the valid time is set to two hours, and when the first device and the second device communicate with each other, only if the time difference between the current time and the time corresponding to the timestamp is within the preset authentication time, that is, within two hours, the data communication between the first device and the second device can be implemented. Therefore, the second device may perform, before communicating with the first device, or in real time, detection on whether a time difference between the current time and the timestamp exceeds a preset authentication time, and if the time difference does not exceed the preset authentication time, may perform data communication, and if the time difference exceeds the preset authentication time, the second device re-initiates an authentication procedure and re-performs inter-device authentication, so as to further ensure security of communication between devices.
When it is determined that data interaction is actually performed after the first device and the second device are authenticated, the second device may send second communication data to the first device, where the second communication data at least includes second communication content and a second communication code, the second communication content is data that the second device actually needs to send to the first device, for example, when the second device is a door lock host, the second communication content is an action that the door lock host wants to execute a fingerprint module, and the second communication code is a character string obtained by the second device by encrypting the ID of the first device, the first random number, and the second communication content based on a second key, and is mainly used for security authentication of the first device.
When the second device receives the communication data sent by the first device, it also needs to perform security verification on the communication data, and a flowchart of a method implemented correspondingly at this time is shown in fig. 4, and mainly includes steps S401 to S403:
s401, receiving first communication data sent by first equipment.
The first communication data at least comprises first communication content and a first communication code, the first communication content is data which is actually required to be sent to the second device by the first device, and the first communication code is a character string which is obtained by encrypting the second character string and the first communication content by the first device based on the first key.
S402, the first communication code is decrypted according to the second secret key to obtain a fourth decryption result.
And S403, when the fourth decryption result is the same as the second character string and the first communication content, determining that the first communication data passes the authentication, and executing the first communication content.
Since the first key and the second key are the same or matched keys, the first communication code obtained by encrypting based on the first key can be decrypted by using the second key which is the same or matched with the first key, and the second device can determine that the first communication data passes the authentication and execute the first communication content or perform subsequent processing according to the first communication content under the condition that a fourth decryption result obtained by decrypting is the same as a character string formed by the second character string and the first communication content according to a preset sequence.
In this embodiment, on the basis that the mutual authentication of the first device and the second device is passed, security authentication on communication content is also realized based on the encrypted communication code during data communication, and the security of data transmission between devices is further improved.
In actual use, the first communication content sent by the first device is fingerprint information of a user under normal conditions, the second device compares the fingerprint information with a pre-recorded fingerprint stored in the second device after receiving the fingerprint information, and if the fingerprint database has the same fingerprint as the fingerprint information acquired by the first device, the door lock can be unlocked.
Specifically, the door lock host can realize the identification of the fingerprint based on the following modes:
s1, acquiring a fingerprint characteristic value to be identified;
s2, comparing the fingerprint characteristic value to be identified with the characteristic value in the first fingerprint group in sequence;
s3, determining that the fingerprint to be identified passes verification when the characteristic value of the first fingerprint data in the first fingerprint group is the same as the characteristic value of the fingerprint to be identified;
and S4, sequentially comparing the characteristic value of the fingerprint to be identified with the characteristic values of other fingerprints except the first fingerprint group in the fingerprint database under the condition that the first fingerprint data does not exist in the first fingerprint group, and determining whether the fingerprint to be identified passes the verification or not based on the comparison result.
When the door lock host performs fingerprint identification, firstly, a to-be-identified fingerprint characteristic value acquired by a fingerprint module is compared with a fingerprint characteristic value in a first fingerprint group, wherein the first fingerprint group is a set of characteristic values of a fingerprint with the highest verification frequency in all fingerprints recorded in the intelligent door lock, and a is a positive integer, preferably between 10 and 30. The door lock host counts the verification frequency of each fingerprint in the fingerprint database within a certain historical time period through self-learning and analysis of historical verification conditions, the higher the verification frequency is, the higher the frequency of using the intelligent door lock by a user corresponding to the fingerprint is, and for the part of users, if the sequence of the fingerprint characteristic values corresponding to the part of users stored in the fingerprint database is relatively later, the longer time is needed for characteristic value traversal comparison every time of fingerprint identification is carried out, the use experience for the users is poor, therefore, the fingerprint characteristic values of the part of users are extracted to form a first fingerprint group, the priority of the first fingerprint group in identification is higher than that of other fingerprint characteristic values in the fingerprint database, and after the fingerprint characteristic values to be identified are obtained, the fingerprint characteristic values in the first fingerprint group are preferentially used for comparison with the fingerprint to be identified.
Because the number of the fingerprint characteristic values in the first fingerprint group is small, the comparison result can be known quickly during comparison and identification, if a first fingerprint data exists in the first fingerprint group, the characteristic value of the first fingerprint data is the same as the characteristic value of the fingerprint to be identified, the fact that the user corresponding to the fingerprint characteristic value to be identified is the user who has performed fingerprint input in advance is proved, namely the fingerprint to be identified passes verification, and the intelligent door lock can perform unlocking operation.
Under the condition that the first fingerprint data does not exist in the first fingerprint group, the verification frequency of the current fingerprint to be recognized is low, at the moment, the fingerprint characteristic value to be recognized can be sequentially compared with other fingerprint characteristic values except the first fingerprint group in the fingerprint database, if the fingerprint data with the same fingerprint characteristic value to be recognized exists in the fingerprint database, the fact that the current user is the user who carries out fingerprint input in advance is proved, namely the fingerprint to be recognized passes the verification, the intelligent door lock can carry out unlocking operation, if the fingerprint data with the same fingerprint characteristic value to be recognized does not exist in the fingerprint database, the user corresponding to the fingerprint to be recognized is determined not to be the user who carries out fingerprint input in advance, the intelligent door lock is kept in a locked state, and the condition that the user illegally unlocks the door lock is prevented, so that the safety of the user using the door lock is ensured.
Further, when the door lock host performs fingerprint identification, the current time may also be referred to optimize fingerprint identification efficiency, for example, after the fingerprint feature value to be identified is obtained in step S1, the following steps are also implemented:
s5, acquiring the current time;
s6, detecting whether the current time is in a preset time period;
s7, sequentially comparing the characteristic value of the fingerprint to be identified with the characteristic value in the second fingerprint group under the condition that the current time is within the preset time period;
s8, determining that the fingerprint to be identified passes verification when the characteristic value of the second fingerprint data in the second fingerprint group is the same as the characteristic value of the fingerprint to be identified;
and S9, sequentially comparing the characteristic value of the fingerprint to be identified with the characteristic value of the first fingerprint group under the condition that the second fingerprint data does not exist in the second fingerprint group.
On the basis of setting the first fingerprint group, at least one second fingerprint group can be set, and each second fingerprint group is a set of characteristic values corresponding to B fingerprints with the highest verification frequency in the fingerprint database in different preset time periods, wherein B is a positive integer; certainly, in actual use, for the second fingerprint groups corresponding to different preset time periods, the number B of the fingerprint feature values contained in the second fingerprint groups may also be different, and the feature value of the same fingerprint may also exist in a plurality of second fingerprint groups at the same time.
After the fingerprint characteristic value to be identified is obtained, the door lock host obtains the current time, and judges whether the current time is in one or more preset time periods, if the current time is in the preset time period, the fingerprint characteristic value to be identified is preferentially compared with the characteristic value in the second fingerprint group, because the number of the fingerprint characteristic values in the second fingerprint group is less than that of all fingerprints, the comparison result can be rapidly known during comparison and identification, if a second fingerprint data exists in the second fingerprint group, and the characteristic value is the same as the fingerprint characteristic value to be identified, the fact that the user corresponding to the fingerprint characteristic value to be identified is the user who has performed fingerprint input in advance is proved, namely the fingerprint to be identified passes verification, and the intelligent door lock can perform unlocking operation.
If the second fingerprint data does not exist in the second fingerprint group, or the current time is not within the preset time period, the characteristic value of the fingerprint to be identified may be compared with the characteristic value in the first fingerprint group, that is, step S2 and the subsequent steps in the fingerprint identification method are executed until the comparison result is determined, which is not repeated here.
A third embodiment of the present disclosure provides a storage medium, which may be installed in a fingerprint module of an intelligent door lock, and is specifically a computer-readable medium, storing a computer program, and when the computer program is executed by a processor, implementing the method provided in any embodiment of the present disclosure, including the following steps S31 to S34:
s31, receiving an authentication binding request sent by the second device, where the authentication binding request at least includes: the second authentication code is obtained by encrypting the ID, the second random number and the timestamp of the second equipment by the second equipment based on a second key;
s32, decrypting the second authentication code according to the first key to obtain a first decryption result;
s33, storing the second string and sending an authentication feedback request to the second device when the first decryption result is the same as the second string, where the authentication feedback request at least includes: the authentication method comprises the steps that an ID, a first random number and a first authentication code of first equipment are obtained after a first character string consisting of the ID, the first random number, the ID of second equipment, the second random number and a time stamp of the first equipment is encrypted based on a first secret key; wherein the first key corresponds to the second key;
s34, when receiving the authentication success message sent by the second device, determines that the first device and the second device are authenticated.
After the computer program is executed by the processor to determine that the first device and the second device are authenticated, the processor further executes the following steps: and sending communication data to the second equipment or receiving the communication data sent by the second equipment when the time difference between the current time and the time stamp is within the preset authentication time.
After the computer program is executed by the processor to determine that the first device and the second device are authenticated, the processor further executes the following steps: sending first communication data to second equipment, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content based on the first key.
After the computer program is executed by the processor to determine that the first device and the second device are authenticated, the processor further executes the following steps: receiving second communication data sent by second equipment, wherein the second communication data at least comprises: the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key; decrypting the second communication code based on the first key to obtain a third decryption result; in a case where the third decryption result is identical to the ID of the first device, the first random number, and the second communication content, it is determined that the second communication data authentication is passed, and the second communication content is executed.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
A fourth embodiment of the present disclosure provides a storage medium, which is installable in a door lock host of an intelligent door lock, and is specifically a computer-readable medium storing a computer program, where the computer program, when executed by a processor, implements the method provided in any embodiment of the present disclosure, and the method includes the following steps S41 to S44:
s41, sending an authentication binding request to the first device, the authentication binding request at least comprising: a second character string consisting of the ID, the second random number and the time stamp of the second device and a second authentication code, wherein the second authentication code is obtained by encrypting the ID, the second random number and the time stamp of the second device based on a second key;
s42, receiving an authentication feedback request sent by the second device, where the authentication feedback request at least includes: the authentication method comprises the steps that an ID, a first random number and a first authentication code of first equipment are obtained after the first equipment encrypts a first character string consisting of the ID, the first random number, the ID of second equipment, a second random number and a time stamp based on a first secret key;
s43, decrypting the first authentication code according to the second key to obtain a second decryption result; wherein the first key corresponds to the second key;
s44, in case that the second decryption result is the same as the first string, storing the ID of the first device and the first random number, and transmitting an authentication success message to the first device.
After the computer program is executed by the processor to send the authentication success message to the first device, the following steps are also executed by the processor: receiving first communication data sent by first equipment, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content by the first equipment based on the first key; decrypting the first communication code according to the second key to obtain a fourth decryption result; and when the fourth decryption result is the same as the second character string and the first communication content, determining that the first communication data passes the authentication, and executing the first communication content.
After the computer program is executed by the processor to send the authentication success message to the first device, the following steps are also executed by the processor: sending second communication data to the first equipment, wherein the second communication data at least comprises: the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key.
After the computer program is executed by the processor to send the authentication success message to the first device, the following steps are also executed by the processor: detecting whether the time difference between the current time and the timestamp exceeds a preset authentication time or not; and under the condition that the time difference exceeds the preset authentication time, the authentication between the first equipment and the second equipment is carried out again.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
A fifth embodiment of the present disclosure provides an electronic device, which can be used as a fingerprint module in an intelligent door lock, and a schematic structural diagram of the electronic device is shown in fig. 5, where the electronic device at least includes a memory 100 and a processor 200, the memory 100 stores a computer program, and the processor 200 implements the method provided in any embodiment of the present disclosure when executing the computer program on the memory 100. Illustratively, the electronic device computer program steps are as follows S51-S54:
s51, receiving an authentication binding request sent by the second device, where the authentication binding request at least includes: the second authentication code is obtained by encrypting the ID, the second random number and the timestamp of the second equipment by the second equipment based on a second key;
s52, decrypting the second authentication code according to the first key to obtain a first decryption result;
s53, storing the second string and sending an authentication feedback request to the second device when the first decryption result is the same as the second string, where the authentication feedback request at least includes: the authentication method comprises the steps that an ID, a first random number and a first authentication code of first equipment are obtained after a first character string consisting of the ID, the first random number, the ID of second equipment, the second random number and a time stamp of the first equipment is encrypted based on a first secret key; wherein the first key corresponds to the second key;
s54, when receiving the authentication success message sent by the second device, determines that the first device and the second device are authenticated.
The processor, after executing the computer program stored on the memory, further executes the following computer program: and sending communication data to the second equipment or receiving the communication data sent by the second equipment when the time difference between the current time and the time stamp is within the preset authentication time.
The processor, after executing the computer program stored on the memory, further executes the following computer program: sending first communication data to second equipment, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content based on the first key.
The processor, after executing the computer program stored on the memory, further executes the following computer program: receiving second communication data sent by second equipment, wherein the second communication data at least comprises: the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key; decrypting the second communication code based on the first key to obtain a third decryption result; in a case where the third decryption result is identical to the ID of the first device, the first random number, and the second communication content, it is determined that the second communication data authentication is passed, and the second communication content is executed.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
A sixth embodiment of the present disclosure provides an electronic device, which can be used as a fingerprint module in an intelligent door lock, and its schematic structural diagram is shown in fig. 6, and includes at least a memory 300 and a processor 400, where the memory 300 stores a computer program, and the processor 400 implements the method provided in any embodiment of the present disclosure when executing the computer program on the memory 300. Illustratively, the electronic device computer program steps are as follows S61-S64:
s61, sending an authentication binding request to the first device, the authentication binding request at least comprising: a second character string consisting of the ID, the second random number and the time stamp of the second device and a second authentication code, wherein the second authentication code is obtained by encrypting the ID, the second random number and the time stamp of the second device based on a second key;
s62, receiving an authentication feedback request sent by the second device, where the authentication feedback request at least includes: the authentication method comprises the steps that an ID, a first random number and a first authentication code of first equipment are obtained after the first equipment encrypts a first character string consisting of the ID, the first random number, the ID of second equipment, a second random number and a time stamp based on a first secret key;
s63, decrypting the first authentication code according to the second key to obtain a second decryption result; wherein the first key corresponds to the second key;
s64, in case that the second decryption result is the same as the first string, storing the ID of the first device and the first random number, and transmitting an authentication success message to the first device.
The processor, after executing the authentication success message stored on the memory to the first device, further executes the computer program of: receiving first communication data sent by first equipment, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content by the first equipment based on the first key; decrypting the first communication code according to the second key to obtain a fourth decryption result; and when the fourth decryption result is the same as the second character string and the first communication content, determining that the first communication data passes the authentication, and executing the first communication content.
The processor, after executing the authentication success message stored on the memory to the first device, further executes the computer program of: sending second communication data to the first equipment, wherein the second communication data at least comprises: the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key.
The processor, after executing the authentication success message stored on the memory to the first device, further executes the computer program of: detecting whether the time difference between the current time and the timestamp exceeds a preset authentication time or not; and under the condition that the time difference exceeds the preset authentication time, the authentication between the first equipment and the second equipment is carried out again.
According to the embodiment, based on the corresponding preset secret key between the two devices, mutual encryption authentication is carried out on the information of the devices, and subsequent data communication can be carried out only after the authentication of the two devices is passed, so that illegal data transmission through monitoring communication interfaces or simulating fingerprint communication protocols and other modes is avoided, the safety of communication between the devices is improved, and the use experience of a user in the process of using the devices is improved.
While the present disclosure has been described in detail with reference to the embodiments, the present disclosure is not limited to the specific embodiments, and those skilled in the art can make various modifications and alterations based on the concept of the present disclosure, and the modifications and alterations should fall within the scope of the present disclosure as claimed.
Claims (11)
1. An authentication method between devices, applied to a first device, includes:
receiving an authentication binding request sent by a second device, wherein the authentication binding request at least comprises: a second string composed of the ID of the second device, a second random number, and a timestamp, and a second authentication code, where the second authentication code is obtained by encrypting, by the second device, the ID of the second device, the second random number, and the timestamp based on a second key;
decrypting the second authentication code according to the first key to obtain a first decryption result;
and under the condition that the first decryption result is the same as the second character string, storing the second character string and sending an authentication feedback request to the second equipment, wherein the authentication feedback request at least comprises: the ID of the first device, a first random number and a first authentication code are obtained by encrypting a first character string consisting of the ID of the first device, the first random number, the ID of the second device, the second random number and the timestamp based on the first key;
when receiving an authentication success message sent by the second device, determining that the first device and the second device pass authentication;
wherein the first key corresponds to the second key.
2. The authentication method of claim 1, wherein after determining that the first device and the second device are authenticated, further comprising:
and sending communication data to the second equipment or receiving the communication data sent by the second equipment when the time difference between the current time and the timestamp is within a preset authentication time.
3. The authentication method of claim 1, wherein after determining that the first device and the second device are authenticated, further comprising:
sending first communication data to the second device, wherein the first communication data at least comprises: the first communication code is obtained by encrypting the second character string and the first communication content based on the first key.
4. The authentication method of claim 1, wherein after determining that the first device and the second device are authenticated, further comprising:
receiving second communication data sent by the second device, wherein the second communication data at least comprises: the second communication content and a second communication code, wherein the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key;
decrypting the second communication code based on the first key to obtain a third decryption result;
and determining that the second communication data passes authentication and executing the second communication content when the third decryption result is the same as the ID of the first device, the first random number and the second communication content.
5. An authentication method between devices, applied to a second device, includes:
sending an authentication binding request to a first device, the authentication binding request comprising at least: a second string composed of the ID of the second device, a second random number, and a timestamp, and a second authentication code, where the second authentication code is obtained by encrypting the ID of the second device, the second random number, and the timestamp based on a second key;
receiving an authentication feedback request sent by the second device, wherein the authentication feedback request at least comprises: the ID of the first device, a first random number and a first authentication code, wherein the first authentication code is obtained by encrypting a first character string consisting of the ID of the first device, the first random number, the ID of the second device, the second random number and the timestamp by the first device based on the first key;
decrypting the first authentication code according to the second key to obtain a second decryption result;
under the condition that the second decryption result is the same as the first character string, storing the ID of the first equipment and the first random number, and sending an authentication success message to the first equipment;
wherein the first key corresponds to the second key.
6. The authentication method of claim 5, after sending the authentication success message to the first device, further comprising:
receiving first communication data sent by the first device, wherein the first communication data at least comprises: the first communication content and a first communication code are obtained by the first device after encrypting the second character string and the first communication content based on the first key;
decrypting the first communication code according to the second key to obtain a fourth decryption result;
and when the fourth decryption result is the same as the second character string and the first communication content, determining that the first communication data passes authentication, and executing the first communication content.
7. The authentication method of claim 5, after sending the authentication success message to the first device, further comprising:
sending second communication data to the first device, wherein the second communication data at least comprises: and the second communication code is obtained by encrypting the ID of the first device, the first random number and the second communication content by the second device based on the second key.
8. The authentication method of claim 5, after sending the authentication success message to the first device, further comprising:
detecting whether the time difference between the current time and the timestamp exceeds a preset authentication time or not;
and under the condition that the time difference exceeds the preset authentication time, re-authenticating the first equipment and the second equipment.
9. A storage medium storing a computer program, characterized in that the computer program, when being executed by a processor, realizes the steps of the authentication method according to any one of claims 1 to 8.
10. An electronic device comprising at least a memory, a processor, said memory having a computer program stored thereon, characterized in that said processor, when executing the computer program on said memory, implements the steps of the authentication method according to any one of claims 1 to 4.
11. An electronic device comprising at least a memory, a processor, the memory having a computer program stored thereon, characterized in that the processor realizes the steps of the authentication method of any one of claims 5 to 8 when executing the computer program on the memory.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011548819.3A CN112738052B (en) | 2020-12-24 | 2020-12-24 | Authentication method between devices, storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011548819.3A CN112738052B (en) | 2020-12-24 | 2020-12-24 | Authentication method between devices, storage medium and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112738052A true CN112738052A (en) | 2021-04-30 |
CN112738052B CN112738052B (en) | 2021-11-23 |
Family
ID=75605398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011548819.3A Active CN112738052B (en) | 2020-12-24 | 2020-12-24 | Authentication method between devices, storage medium and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112738052B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113609467A (en) * | 2021-07-14 | 2021-11-05 | 海南视联通信技术有限公司 | Identity authentication method, identity authentication device, terminal equipment and storage medium |
WO2023045536A1 (en) * | 2021-09-26 | 2023-03-30 | 支付宝(中国)网络技术有限公司 | Information display |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN108512846A (en) * | 2018-03-30 | 2018-09-07 | 北京邮电大学 | Mutual authentication method and device between a kind of terminal and server |
CN109391468A (en) * | 2017-08-14 | 2019-02-26 | 杭州萤石网络有限公司 | A kind of authentication method and system |
CN111047744A (en) * | 2019-12-28 | 2020-04-21 | 北京深思数盾科技股份有限公司 | Digital unlocking method and device, electronic door lock and storage medium |
CN111435913A (en) * | 2019-01-14 | 2020-07-21 | 海信集团有限公司 | Identity authentication method and device for terminal of Internet of things and storage medium |
CN111815810A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Safe unlocking method and device for electronic lock |
-
2020
- 2020-12-24 CN CN202011548819.3A patent/CN112738052B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060050877A1 (en) * | 2004-09-07 | 2006-03-09 | Mitsuhiro Nakamura | Information processing apparatus and method, program, and recording medium |
CN109391468A (en) * | 2017-08-14 | 2019-02-26 | 杭州萤石网络有限公司 | A kind of authentication method and system |
CN108512846A (en) * | 2018-03-30 | 2018-09-07 | 北京邮电大学 | Mutual authentication method and device between a kind of terminal and server |
CN111435913A (en) * | 2019-01-14 | 2020-07-21 | 海信集团有限公司 | Identity authentication method and device for terminal of Internet of things and storage medium |
CN111047744A (en) * | 2019-12-28 | 2020-04-21 | 北京深思数盾科技股份有限公司 | Digital unlocking method and device, electronic door lock and storage medium |
CN111815810A (en) * | 2020-06-22 | 2020-10-23 | 北京智辉空间科技有限责任公司 | Safe unlocking method and device for electronic lock |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113609467A (en) * | 2021-07-14 | 2021-11-05 | 海南视联通信技术有限公司 | Identity authentication method, identity authentication device, terminal equipment and storage medium |
CN113609467B (en) * | 2021-07-14 | 2024-05-10 | 海南视联通信技术有限公司 | Identity authentication method, device, terminal equipment and storage medium |
WO2023045536A1 (en) * | 2021-09-26 | 2023-03-30 | 支付宝(中国)网络技术有限公司 | Information display |
Also Published As
Publication number | Publication date |
---|---|
CN112738052B (en) | 2021-11-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP7152466B2 (en) | Secure communication method and smart lock system based thereon | |
KR101727660B1 (en) | Method of using one device to unlock another device | |
CN105118127B (en) | A kind of guest system and control method thereof | |
CN109618334B (en) | Control method and related equipment | |
CN109035519B (en) | Biological feature recognition device and method | |
CN110189442A (en) | Authentication method and device | |
WO2018119623A1 (en) | Method of unlocking electronic lock device, and client and electronic lock device thereof | |
CN112738052B (en) | Authentication method between devices, storage medium and electronic device | |
CN107368737A (en) | A kind of processing method for preventing copy-attack, server and client | |
CN108650219B (en) | User identity identification method, related device, equipment and system | |
CN112565265A (en) | Authentication method, authentication system and communication method between terminal devices of Internet of things | |
CN111540093A (en) | Access control system and control method thereof | |
CA2706716C (en) | Device detection with secure identity authentication | |
CN110738764A (en) | Security control system and method based on intelligent lock | |
CN112487380A (en) | Data interaction method, device, equipment and medium | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
CN112102524A (en) | Unlocking method and unlocking system | |
CN112989316B (en) | ADB authorization authentication method and system | |
CN107171784B (en) | Emergency command scheduling method and system for emergency environment events | |
CN114024672A (en) | Safety protection method and system for low-voltage power line carrier communication system | |
CN113593088A (en) | Intelligent unlocking method, intelligent lock, mobile terminal and server | |
CN110619228B (en) | File decryption method, file encryption method, file management system and storage medium | |
CN109902481B (en) | Encryption lock authentication method for encryption equipment and encryption equipment | |
CN111274570A (en) | Encryption authentication method and device, server, readable storage medium and air conditioner | |
CN112184960B (en) | Intelligent lock control method and device, intelligent lock system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee after: Beijing Shendun Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP01 | Change in the name or title of a patent holder |