CN112887981A - Authentication method and system for power wireless private network terminal access - Google Patents
Authentication method and system for power wireless private network terminal access Download PDFInfo
- Publication number
- CN112887981A CN112887981A CN202110038657.7A CN202110038657A CN112887981A CN 112887981 A CN112887981 A CN 112887981A CN 202110038657 A CN202110038657 A CN 202110038657A CN 112887981 A CN112887981 A CN 112887981A
- Authority
- CN
- China
- Prior art keywords
- terminal
- candidate terminal
- shared
- candidate
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an authentication method for accessing a power wireless private network terminal, which comprises the steps of acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set; traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter; and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes. A corresponding system is also disclosed. The invention uses the shared pseudo-random function to obtain the pseudo-random number for verification information verification, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the searching efficiency of the terminal.
Description
Technical Field
The invention relates to an authentication method and an authentication system for terminal access of a power wireless private network, and belongs to the field of terminal identity authentication.
Background
The power wireless private network terminal access (i.e. access base station) usually needs identity authentication. In the low-cost power wireless private network, based on cost consideration, a symmetric cryptographic algorithm is used for authentication, and the method has a contradiction: on one hand, in order to ensure the anonymity of the terminal, the authentication mode does not send a plaintext; on the other hand, a shared key is required between the terminal and the base station. Therefore, in a group of terminals, it is difficult for the base station to find the key corresponding to a certain terminal, and an exhaustive search method is usually used to determine the key of the terminal. The computational complexity of this method is linear and related to the number of terminals, and therefore less efficient in case of large-scale terminal access.
Disclosure of Invention
The invention provides an authentication method and system for power wireless private network terminal access, which solve the problem of low efficiency of the existing method under the condition of large-scale terminal access.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
an authentication method for power wireless private network terminal access comprises,
acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
And according to the terminal side security parameters and the base station side security parameters, adopting a shared deterministic pseudorandom function, and calculating a pseudorandom number z as f (a, b), wherein f is the deterministic pseudorandom function, and a and b are respectively the base station side security parameters and the terminal side security parameters.
In a round of verification process, in response to the condition that f (a, b) is not satisfied, removing candidate terminal identifications participating in verification from a candidate terminal identification set; and in response to the fact that the f (a, b) is established, reserving the candidate terminal identification participating in the verification.
According to the terminal side safety parameters and the base station side safety parameters, the shared probabilistic pseudo-random function is adopted to calculate the pseudo-random numberWherein, a and b are respectively a base station side safety parameter and a terminal side safety parameter, epsilon is random noise, and f is a deterministic pseudorandom function.
In a round of verification process, in response to the condition that f (a, b) is not true, adding 1 to an error count corresponding to a candidate terminal identifier participating in verification, and reserving the candidate terminal identifier or removing the candidate terminal identifier from a candidate terminal identifier set according to a preset rule; and responding to the fact that f (a, b) is satisfied, and keeping the candidate terminal identification in the verification in a way that the error count corresponding to the candidate terminal identification is unchanged.
The preset rule is that the candidate terminal identification is removed from the candidate terminal identification set in response to the error count exceeding the threshold value, and the candidate terminal identification is reserved in response to the error count not exceeding the threshold value.
And responding to the end of the traversal, and if a plurality of candidate terminal identifications or no candidate terminal identifications pass all rounds of verification, the terminal access authentication fails.
An authentication system for the access of a power wireless private network terminal comprises,
an acquisition module: acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
and traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
a result module: and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
A computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform an authentication method for wireless private network terminal access.
A computing device comprising one or more processors, one or more memories, and one or more programs stored in the one or more memories and configured to be executed by the one or more processors, the one or more programs comprising instructions for performing an authentication method for powered wireless private network terminal access.
The invention achieves the following beneficial effects: the invention uses the shared pseudo random function to obtain the pseudo random number for verification information verification, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the search efficiency of the terminal; meanwhile, the invention has no identity information in the transmitted information, thereby ensuring the confidentiality of the authentication.
Drawings
FIG. 1 is a first round of authentication process according to the present invention;
fig. 2 is a second round authentication process according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
An authentication method for power wireless private network terminal access comprises the following steps:
step 1, acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set.
Step 2, traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; and the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter.
The pseudo random number is calculated in two ways:
1. calculating a pseudo-random number z ═ f (a, b) using a shared deterministic pseudo-random function;
wherein, f is a deterministic pseudorandom function, and a and b are respectively a base station side safety parameter and a terminal side safety parameter;
in a round of verification process, in response to the condition that f (a, b) is not satisfied, removing candidate terminal identifications participating in verification from a candidate terminal identification set; and in response to the fact that the f (a, b) is established, reserving the candidate terminal identification participating in the verification.
Wherein the content of the first and second substances,the method is a probabilistic pseudo-random function, a and b are respectively a base station side safety parameter and a terminal side safety parameter, epsilon is random noise and obeys Bernoulli distribution with the parameter eta;
in a round of verification process, in response to the condition that f (a, b) is not true, adding 1 to an error count corresponding to a candidate terminal identifier participating in verification, and reserving the candidate terminal identifier or removing the candidate terminal identifier from a candidate terminal identifier set according to a preset rule; and responding to the fact that f (a, b) is satisfied, and keeping the candidate terminal identification in the verification in a way that the error count corresponding to the candidate terminal identification is unchanged.
Presetting a rule: and eliminating the candidate terminal identification from the candidate terminal identification set in response to the error count exceeding the threshold value, and reserving the candidate terminal identification in response to the error count not exceeding the threshold value.
Step 3, responding to the traversal completion, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes; and responding to the end of the traversal, and if a plurality of candidate terminal identifications or no candidate terminal identifications pass all rounds of verification, the terminal access authentication fails.
Suppose that n candidate terminal identification IDs are recorded in the database1,…,IDnAnd s shared secret keys, one bit output deterministic pseudo-random function (shared deterministic pseudo-random function) and s secret keys (shared secret) are shared between the base station and the access terminalA key).
The whole authentication process is performed in s rounds, each round uses a different shared key, for example, in round i, as shown in fig. 1:
11) the base station sends a base station side safety parameter a to the terminal;
12) the terminal receives a, calculates z ═ f (a, b) according to a and the terminal side security parameter b, and transmits (b, z) to the base station;
13) the base station receives (b, z) the round according to which the shared key k is to be usediRespectively combining with each candidate terminal Identification (ID) in the candidate terminal identification set, verifying whether f (a, b) is true or not, and if the verification is passed, kiAnd reserving the corresponding ID, otherwise, removing the ID from the candidate terminal identification set.
In the first round of verification, all candidate terminal identifications participate in verification, and in the subsequent verification, only the candidate terminal identifications reserved in the candidate terminal identification set participate in verification.
After executing s rounds, if only one candidate terminal identification is reserved, the access terminal is a legal terminal, and the authentication is successful; if a plurality of candidate terminal identifications are reserved, indicating that the terminal outputs conflict and the authentication fails; if the reserved number is 0, the authentication fails, and the terminal is an illegal terminal.
It can be easily seen that the correct candidate terminal identification can always be successfully authenticated without being interfered by an adversary. But there is also a certain probability that the authentication will be passed for an incorrect candidate terminal identification. Assuming that the function f (-) is uniform, the probability of a wrong candidate terminal identification passing a certain round is 2-1And the probability of passing through all rounds is 2-s. For the case of multiple candidate terminal identifications, assuming that the number of terminals in the system is n, after a correct terminal is removed, the probability that the rest n-1 terminals pass authentication is: pcollision=(n-1)2-s. It can be seen that for different n, as long as s is large enough, the probability of collision is very small.
Suppose that n candidate terminal identification IDs are recorded in the database1,…,IDnAnd s shared secret keys, one shared secret key is shared between the base station and the access terminalThe bits output a probabilistic pseudo-random function (i.e., a shared probabilistic pseudo-random function) and s keys (i.e., shared keys).
Due to the use of the probabilistic pseudo-random function, the base station does not need to respond to the terminal exactly consistently. The response allows for some error as long as the total error does not exceed the defined range.
The whole authentication process is performed in s rounds, each round uses a different shared key, for example, in round i, as shown in fig. 2:
11) the base station sends a base station side safety parameter a to the terminal;
12) the terminal receives a, calculates according to a and a terminal side safety parameter bTransmitting (b, z) to a base station;
13) the base station receives (b, z) the round according to which the shared key k is to be usediAnd respectively combining the candidate terminal identifications (ID for short) in the candidate terminal identification set, verifying whether f (a, b) ═ z is true, if the verification is passed, keeping the error counts corresponding to the candidate terminal identifications participating in the verification unchanged, if the verification is not passed, adding 1 to the error counts corresponding to the candidate terminal identifications participating in the verification, and keeping or removing the candidate terminal identifications from the candidate terminal identification set according to a preset rule.
Presetting a rule: and eliminating the candidate terminal identification from the candidate terminal identification set in response to the error count exceeding the threshold value, and reserving the candidate terminal identification in response to the error count not exceeding the threshold value.
After executing s rounds, if only one candidate terminal identification is reserved, the access terminal is a legal terminal, and the authentication is successful; if a plurality of candidate terminal identifications are reserved, the terminal output conflict is shown, and the authentication fails, but the probability of the situation is very small and can be ignored; if the reserved number is 0, the authentication fails, and the terminal is an illegal terminal.
It is easy to see that even for a legitimate terminal, the base station has a certain probability of failing the terminal authentication, and the failure probability is related to the noise parameter η, and the greater η, the lower the probability of the base station identifying the legitimate terminal.
The method uses the shared pseudo random function to obtain the pseudo random number for verification information verification, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the search efficiency of the terminal; meanwhile, the invention has no identity information in the transmitted information, thereby ensuring the confidentiality of the authentication.
An authentication system for the access of a power wireless private network terminal comprises,
an acquisition module: acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
and traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
a result module: and responding to the end of traversal, and if only one candidate terminal identification passes all rounds of verification, the terminal access authentication is passed.
A computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform an authentication method for wireless private network terminal access.
A computing device comprising one or more processors, one or more memories, and one or more programs stored in the one or more memories and configured to be executed by the one or more processors, the one or more programs comprising instructions for performing an authentication method for powered wireless private network terminal access.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The present invention is not limited to the above embodiments, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present invention are included in the scope of the claims of the present invention which are filed as the application.
Claims (10)
1. An authentication method for power wireless private network terminal access is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
2. The method for authenticating the access of the power wireless private network terminal according to claim 1, wherein: and according to the terminal side security parameters and the base station side security parameters, adopting a shared deterministic pseudorandom function, and calculating a pseudorandom number z as f (a, b), wherein f is the deterministic pseudorandom function, and a and b are respectively the base station side security parameters and the terminal side security parameters.
3. The method for authenticating the access of the power wireless private network terminal according to claim 2, wherein: in a round of verification process, in response to the condition that f (a, b) is not satisfied, removing candidate terminal identifications participating in verification from a candidate terminal identification set; and in response to the fact that the f (a, b) is established, reserving the candidate terminal identification participating in the verification.
4. The method for authenticating the access of the power wireless private network terminal according to claim 1, wherein: according to the terminal side safety parameters and the base station side safety parameters, a shared probabilistic pseudo-random function is adoptedNumber, calculating pseudo random numberWherein, a and b are respectively a base station side safety parameter and a terminal side safety parameter, epsilon is random noise, and f is a deterministic pseudorandom function.
5. The method for authenticating the access of the power wireless private network terminal according to claim 4, wherein: in a round of verification process, in response to the condition that f (a, b) is not true, adding 1 to an error count corresponding to a candidate terminal identifier participating in verification, and reserving the candidate terminal identifier or removing the candidate terminal identifier from a candidate terminal identifier set according to a preset rule; and responding to the fact that f (a, b) is satisfied, and keeping the candidate terminal identification in the verification in a way that the error count corresponding to the candidate terminal identification is unchanged.
6. The method for authenticating the access of the power wireless private network terminal according to claim 5, wherein: the preset rule is that the candidate terminal identification is removed from the candidate terminal identification set in response to the error count exceeding the threshold value, and the candidate terminal identification is reserved in response to the error count not exceeding the threshold value.
7. The method for authenticating the access of the power wireless private network terminal according to claim 1, wherein: and responding to the end of the traversal, and if a plurality of candidate terminal identifications or no candidate terminal identifications pass all rounds of verification, the terminal access authentication fails.
8. An authentication system for accessing a power wireless private network terminal is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
an acquisition module: acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
and traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
a result module: and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
9. A computer readable storage medium storing one or more programs, characterized in that: the one or more programs include instructions that, when executed by a computing device, cause the computing device to perform any of the methods of claims 1-7.
10. A computing device, characterized by: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
one or more processors, one or more memories, and one or more programs stored in the one or more memories and configured to be executed by the one or more processors, the one or more programs including instructions for performing any of the methods of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110038657.7A CN112887981B (en) | 2021-01-12 | 2021-01-12 | Authentication method and system for power wireless private network terminal access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110038657.7A CN112887981B (en) | 2021-01-12 | 2021-01-12 | Authentication method and system for power wireless private network terminal access |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112887981A true CN112887981A (en) | 2021-06-01 |
CN112887981B CN112887981B (en) | 2022-10-04 |
Family
ID=76044763
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110038657.7A Active CN112887981B (en) | 2021-01-12 | 2021-01-12 | Authentication method and system for power wireless private network terminal access |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112887981B (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
CN105406971A (en) * | 2015-12-09 | 2016-03-16 | 中国电力科学研究院 | RFID security authentication method for intelligent electricity consumption information collection system terminal |
CN108112012A (en) * | 2016-11-24 | 2018-06-01 | 中国移动通信有限公司研究院 | The method for network authorization and device of a kind of group endpoints |
US20180206117A1 (en) * | 2015-07-02 | 2018-07-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for obtaining initial access to a network, and related wireless devices and network nodes |
CN108964897A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | Identity authorization system and method based on group communication |
CN109076339A (en) * | 2016-07-13 | 2018-12-21 | 华为国际有限公司 | The unified certification frame of heterogeneous network |
CN109474438A (en) * | 2018-12-24 | 2019-03-15 | 公安部第三研究所 | It is a kind of based on the intelligent terminal access authentication method selectively revealed |
-
2021
- 2021-01-12 CN CN202110038657.7A patent/CN112887981B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060143453A1 (en) * | 2002-06-19 | 2006-06-29 | Secured Communications, Inc | Inter-authentication method and device |
US20180206117A1 (en) * | 2015-07-02 | 2018-07-19 | Telefonaktiebolaget Lm Ericsson (Publ) | Method for obtaining initial access to a network, and related wireless devices and network nodes |
CN105406971A (en) * | 2015-12-09 | 2016-03-16 | 中国电力科学研究院 | RFID security authentication method for intelligent electricity consumption information collection system terminal |
CN109076339A (en) * | 2016-07-13 | 2018-12-21 | 华为国际有限公司 | The unified certification frame of heterogeneous network |
CN108112012A (en) * | 2016-11-24 | 2018-06-01 | 中国移动通信有限公司研究院 | The method for network authorization and device of a kind of group endpoints |
CN108964897A (en) * | 2018-06-28 | 2018-12-07 | 如般量子科技有限公司 | Identity authorization system and method based on group communication |
CN109474438A (en) * | 2018-12-24 | 2019-03-15 | 公安部第三研究所 | It is a kind of based on the intelligent terminal access authentication method selectively revealed |
Also Published As
Publication number | Publication date |
---|---|
CN112887981B (en) | 2022-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108768660B (en) | Internet of things equipment identity authentication method based on physical unclonable function | |
CN112311735B (en) | Credible authentication method, network equipment, system and storage medium | |
EP3313020B1 (en) | Method of digital identity generation and authentication | |
CN109104476B (en) | Electric power information safety system based on block chain | |
CN111935095A (en) | Source code leakage monitoring method and device and computer storage medium | |
CN108985409B (en) | Identity card information reading method and device and electronic equipment | |
CN113259311A (en) | Decentralized identity authentication system based on block chain | |
EP3563514B1 (en) | Robust computational fuzzy extractor and method for authentication | |
WO2016073048A2 (en) | Protecting against malicious modification in cryptographic operations | |
CN114363008B (en) | Virtual device authentication method and device, electronic device and storage medium | |
CN113268716A (en) | Authorization verification system, method and device for application and storage medium | |
CN112887981B (en) | Authentication method and system for power wireless private network terminal access | |
CN108090371B (en) | Data processing method, data tracking method, data processing device and data tracking device | |
CN103178955B (en) | A kind of authentication method, equipment and system | |
CN112699352B (en) | Trusted data acquisition terminal identity verification method, computer storage medium and electronic equipment | |
CN109803255B (en) | Mobile data information safety communication system and method for digital workshop | |
TWI710243B (en) | Device and method for distributing machine id, and internet-connected device | |
CN111935173A (en) | Router login verification method and device | |
CN110913388A (en) | Safe clustering method and device based on wireless sensor network | |
CN115829186B (en) | ERP management method based on artificial intelligence and data processing AI system | |
CN108933765B (en) | Method, client and server for improving equipment ID security | |
KR20190058034A (en) | Device and method of verification data integrity based of puf | |
CN110858803A (en) | Authentication method, system, server, and computer-readable storage medium | |
CN116709316B (en) | Stateless group key updating method for large-scale dynamic group based on smart card | |
CN115001803B (en) | Mobile phone bank login method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |