CN112887981B - Authentication method and system for power wireless private network terminal access - Google Patents

Authentication method and system for power wireless private network terminal access Download PDF

Info

Publication number
CN112887981B
CN112887981B CN202110038657.7A CN202110038657A CN112887981B CN 112887981 B CN112887981 B CN 112887981B CN 202110038657 A CN202110038657 A CN 202110038657A CN 112887981 B CN112887981 B CN 112887981B
Authority
CN
China
Prior art keywords
candidate terminal
terminal
verification
pseudo
candidate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110038657.7A
Other languages
Chinese (zh)
Other versions
CN112887981A (en
Inventor
刘锐
黄进
赵高峰
缪巍巍
李洋
张明轩
严宇航
刘金锁
丁忠林
吕超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Corp of China SGCC
Nari Information and Communication Technology Co
State Grid Electric Power Research Institute
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Original Assignee
State Grid Corp of China SGCC
Nari Information and Communication Technology Co
State Grid Electric Power Research Institute
Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Corp of China SGCC, Nari Information and Communication Technology Co, State Grid Electric Power Research Institute, Information and Telecommunication Branch of State Grid Jiangsu Electric Power Co Ltd filed Critical State Grid Corp of China SGCC
Priority to CN202110038657.7A priority Critical patent/CN112887981B/en
Publication of CN112887981A publication Critical patent/CN112887981A/en
Application granted granted Critical
Publication of CN112887981B publication Critical patent/CN112887981B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The invention discloses an authentication method for accessing a power wireless private network terminal, which comprises the steps of acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set; traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter; and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes. A corresponding system is also disclosed. The invention uses the shared pseudo-random function to obtain the pseudo-random number for verification information verification, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the searching efficiency of the terminal.

Description

Authentication method and system for power wireless private network terminal access
Technical Field
The invention relates to an authentication method and system for power wireless private network terminal access, and belongs to the field of terminal identity authentication.
Background
The power wireless private network terminal access (i.e. the access base station) usually needs identity authentication. In the low-cost power wireless private network, based on cost consideration, a symmetric cryptographic algorithm is used for authentication, and the method has a contradiction: on one hand, in order to ensure the anonymity of the terminal, the authentication mode does not send a plaintext; on the other hand, a shared key is required between the terminal and the base station. Therefore, in a group of terminals, it is difficult for the base station to find the key corresponding to a certain terminal, and an exhaustive search method is usually used to determine the key of the terminal. The computational complexity of this method is linear and related to the number of terminals, and therefore less efficient in case of large-scale terminal access.
Disclosure of Invention
The invention provides an authentication method and system for power wireless private network terminal access, which solve the problem of low efficiency of the existing method under the condition of large-scale terminal access.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows:
an authentication method for power wireless private network terminal access comprises,
acquiring all candidate terminal identifications and shared keys from a database, and constructing a candidate terminal identification set and a shared key set;
traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; the verification information comprises terminal side security parameters and pseudo random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
And calculating a pseudo-random number z = f (a, b) by adopting a shared deterministic pseudo-random function according to the terminal side security parameters and the base station side security parameters, wherein f is the deterministic pseudo-random function, and a and b are the base station side security parameters and the terminal side security parameters respectively.
In a round of verification process, in response to f (a, b) = z not being established, candidate terminal identifications participating in verification are removed from the candidate terminal identification set; in response to f (a, b) = z being true, the candidate terminal identities participating in the verification are retained.
According to the terminal side safety parameters and the base station side safety parameters, the shared probabilistic pseudo-random function is adopted to calculate the pseudo-random number
Figure GDA0003800617870000021
Wherein a and b are respectively a base station side safety parameter and a terminal side safety parameter, epsilon is random noise,
Figure GDA0003800617870000022
is a probabilistic pseudo-random function.
In one round of verification, in response to
Figure GDA0003800617870000023
If the terminal identifier is not true, adding 1 to the error count corresponding to the candidate terminal identifier participating in verification according to the result of the verificationSetting rules, and reserving the candidate terminal identification or removing the candidate terminal identification from the candidate terminal identification set; in response to
Figure GDA0003800617870000024
And if yes, keeping the error count corresponding to the candidate terminal identification participating in verification unchanged, and reserving the candidate terminal identification.
The preset rule is that the candidate terminal identification is removed from the candidate terminal identification set in response to the error count exceeding the threshold value, and the candidate terminal identification is reserved in response to the error count not exceeding the threshold value.
And responding to the end of the traversal, and if a plurality of candidate terminal identifications or no candidate terminal identifications pass all rounds of verification, the terminal access authentication fails.
An authentication system for the access of a power wireless private network terminal comprises,
an acquisition module: acquiring all candidate terminal identifications and shared keys from a database, and constructing a candidate terminal identification set and a shared key set;
and traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; the verification information comprises terminal side security parameters and pseudo random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
a result module: and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
A computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform an authentication method for power wireless private network terminal access.
A computing device comprising one or more processors, one or more memories, and one or more programs stored in the one or more memories and configured to be executed by the one or more processors, the one or more programs including instructions for performing an authentication method for power wireless private network terminal access.
The invention achieves the following beneficial effects: the invention uses the shared pseudo-random function to obtain the pseudo-random number to verify the verification information, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the searching efficiency of the terminal; meanwhile, the invention has no identity information in the transmitted information, thereby ensuring the confidentiality of the authentication.
Drawings
FIG. 1 is a first round authentication process according to the present invention;
fig. 2 is a second round authentication process according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings. The following examples are only for illustrating the technical solutions of the present invention more clearly, and the protection scope of the present invention is not limited thereby.
An authentication method for power wireless private network terminal access comprises the following steps:
step 1, acquiring all candidate terminal identifications and shared keys from a database, and constructing a candidate terminal identification set and a shared key set.
Step 2, traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; the verification information comprises terminal side security parameters and pseudo random numbers; and the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter.
The pseudo-random number is calculated in two ways:
1. calculating a pseudo-random number z = f (a, b) using a shared deterministic pseudo-random function;
wherein, f is a deterministic pseudorandom function, and a and b are respectively a base station side safety parameter and a terminal side safety parameter;
in a round of verification process, in response to f (a, b) = z failure, removing candidate terminal identifications participating in verification from a candidate terminal identification set; in response to f (a, b) = z being true, the candidate terminal identities participating in the authentication are retained.
2. Computing pseudo-random numbers using a shared probabilistic pseudo-random function
Figure GDA0003800617870000041
Wherein the content of the first and second substances,
Figure GDA0003800617870000042
the system is a probabilistic pseudo-random function, a and b are respectively a base station side safety parameter and a terminal side safety parameter, epsilon is random noise and obeys Bernoulli distribution with the parameter eta;
in a round of verification, in response to
Figure GDA0003800617870000043
If the verification result is false, adding 1 to the error count corresponding to the candidate terminal identification participating in the verification, and reserving the candidate terminal identification or removing the candidate terminal identification from the candidate terminal identification set according to a preset rule; in response to
Figure GDA0003800617870000044
And if the verification is successful, keeping the error count corresponding to the candidate terminal identification participating in the verification unchanged, and reserving the candidate terminal identification.
Presetting a rule: and eliminating the candidate terminal identification from the candidate terminal identification set in response to the error count exceeding the threshold value, and reserving the candidate terminal identification in response to the error count not exceeding the threshold value.
Step 3, responding to the traversal completion, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes; and responding to the end of the traversal, if a plurality of or no candidate terminal identifications pass all rounds of verification, and the terminal access authentication fails.
Suppose that n candidate terminal identification IDs are recorded in the database 1 ,…,ID n And s shared keys, sharing a one-bit-output deterministic pseudorandom function (i.e., shared deterministic pseudorandom number) between the base station and the access terminalMachine function) and s keys (i.e., shared keys).
The whole authentication process is performed in s rounds, each round uses a different shared key, for example, in round i, as shown in fig. 1:
11 The base station sends a base station side security parameter a to the terminal;
12 A terminal receives a, calculates z = f (a, b) according to a and a terminal side security parameter b, and transmits (b, z) to a base station;
13 The base station receives (b, z), based on the round shared key k i Respectively combining with each candidate terminal identifier (ID for short) in the candidate terminal identifier set, verifying whether f (a, b) = z is true, and if the verification is passed, k i And reserving the corresponding ID, otherwise, removing the ID from the candidate terminal identification set.
In the first round of verification, all candidate terminal identifications participate in verification, and in the subsequent verification, only the candidate terminal identifications reserved in the candidate terminal identification set participate in verification.
After executing s rounds, if only one candidate terminal identification is reserved, the access terminal is a legal terminal, and the authentication is successful; if a plurality of candidate terminal identifications are reserved, indicating that the terminal outputs conflict and the authentication fails; if the reserved number is 0, the authentication fails, and the terminal is an illegal terminal.
It can be easily seen that the correct candidate terminal identification can always be successfully authenticated without being interfered by an adversary. But there is also a certain probability that the authentication will be passed for an incorrect candidate terminal identification. Assuming that the function f (-) is uniform, the probability of a wrong candidate terminal identification passing a certain round is 2 -1 And the probability of passing through all rounds is 2 -s . For the case of multiple candidate terminal identifications, assuming that the number of terminals in the system is n, after a correct terminal is removed, the probability that the rest n-1 terminals pass authentication is: p collision =(n-1)2 -s . It can be seen that for different n, as long as s is large enough, the probability of collision is very small.
Suppose that n candidate terminal identification IDs are recorded in the database 1 ,…,ID n And s shared keys, base stationAnd the access terminal share a one-bit output probabilistic pseudo-random function (i.e., shared probabilistic pseudo-random function) and s keys (i.e., shared keys).
Due to the use of the probabilistic pseudo-random function, the base station does not need to respond to the terminal exactly consistently. The response allows for some error as long as the total error does not exceed a defined range.
The whole authentication process is performed in s rounds, each round uses a different shared key, for example, in round i, as shown in fig. 2:
11 The base station sends a base station side security parameter a to the terminal;
12 A terminal receives a, calculates a security parameter b according to a and the terminal side
Figure GDA0003800617870000061
Transmitting (b, z) to a base station;
13 The base station receives (b, z), based on the round shared key k i Respectively combined with each candidate terminal identification (ID for short) in the candidate terminal identification set, and verified
Figure GDA0003800617870000062
And if the verification is successful, keeping the candidate terminal identification, if the verification is successful, keeping the error count corresponding to the candidate terminal identification participating in the verification unchanged, if the verification is unsuccessful, adding 1 to the error count corresponding to the candidate terminal identification participating in the verification, and keeping the candidate terminal identification or removing the candidate terminal identification from the candidate terminal identification in a centralized manner according to a preset rule.
Presetting a rule: and eliminating the candidate terminal identification from the candidate terminal identification set in response to the error count exceeding the threshold value, and reserving the candidate terminal identification in response to the error count not exceeding the threshold value.
After executing s rounds, if only one candidate terminal identification is reserved, the access terminal is a legal terminal, and the authentication is successful; if a plurality of candidate terminal identifications are reserved, the terminal output conflict is shown, and the authentication fails, but the probability of the situation is very small and can be ignored; if the reserved number is 0, the authentication fails, and the terminal is an illegal terminal.
It is easy to see that even for a legitimate terminal, the base station has a certain probability of failing the terminal authentication, and the failure probability is related to the noise parameter η, and the greater η, the lower the probability of the base station identifying the legitimate terminal.
The method uses the shared pseudo random function to obtain the pseudo random number for verification information verification, and can quickly filter and filter wrong candidate terminal identifications, thereby improving the searching efficiency of the terminal; meanwhile, the invention has no identity information in the transmitted information, thereby ensuring the confidentiality of the authentication.
An authentication system for the access of a power wireless private network terminal comprises,
an acquisition module: acquiring all candidate terminal identifications and shared keys from a database, and constructing a candidate terminal identification set and a shared key set;
and traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round; wherein the authentication information comprises terminal-side security parameters and pseudo-random numbers; the pseudo random number is obtained by adopting a shared pseudo random function to calculate according to the terminal side safety parameter and the base station side safety parameter;
a result module: and responding to the end of traversal, and if only one candidate terminal identification passes all rounds of verification, the terminal access authentication is passed.
A computer readable storage medium storing one or more programs, the one or more programs comprising instructions, which when executed by a computing device, cause the computing device to perform an authentication method for wireless private network terminal access.
A computing device comprising one or more processors, one or more memories, and one or more programs stored in the one or more memories and configured to be executed by the one or more processors, the one or more programs including instructions for performing an authentication method for power wireless private network terminal access.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The present invention is not limited to the above embodiments, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present invention are included in the scope of the claims of the present invention which are filed as the application.

Claims (5)

1. An authentication method for power wireless private network terminal access is characterized in that: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round;
the verification information comprises terminal side security parameters and pseudo random numbers;
the pseudo-random number calculation includes:
calculating a pseudo-random number z = f (a, b) by adopting a shared deterministic pseudo-random function according to the terminal side security parameter and the base station side security parameter, wherein f is the deterministic pseudo-random function, and a and b are respectively the base station side security parameter and the terminal side security parameter; in a round of verification process, in response to f (a, b) = z not being established, candidate terminal identifications participating in verification are removed from the candidate terminal identification set; in response to f (a, b) = z being established, retaining candidate terminal identifications participating in authentication;
alternatively, the first and second electrodes may be,
according to the terminal side safety parameters and the base station side safety parameters, the shared probabilistic pseudo-random function is adopted to calculate the pseudo-random number
Figure FDA0003800617860000011
Wherein, epsilon is random noise,
Figure FDA0003800617860000012
is a probabilistic pseudo-random function; in a round of verification, in response to
Figure FDA0003800617860000013
If the verification result is false, adding 1 to the error count corresponding to the candidate terminal identification participating in the verification, and reserving the candidate terminal identification or removing the candidate terminal identification from the candidate terminal identification set according to a preset rule; in response to
Figure FDA0003800617860000014
If yes, keeping the error count corresponding to the candidate terminal identification participating in verification unchanged, and reserving the candidate terminal identification; the preset rule is as follows: removing the candidate terminal identification from the candidate terminal identification set in response to the error count exceeding a threshold value, and reserving the candidate terminal identification in response to the error count not exceeding the threshold value;
and responding to the end of the traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
2. The method for authenticating the access of the power wireless private network terminal according to claim 1, wherein: and responding to the end of the traversal, and if a plurality of candidate terminal identifications or no candidate terminal identifications pass all rounds of verification, the terminal access authentication fails.
3. An authentication system for accessing a power wireless private network terminal is characterized in that: comprises the steps of (a) preparing a substrate,
an acquisition module: acquiring all candidate terminal identifications and shared secret keys from a database, and constructing a candidate terminal identification set and a shared secret key set;
traversing the verification module: traversing all shared keys in the shared key set, combining the shared keys in the current round with each candidate terminal identifier in the candidate terminal identifier set respectively, and verifying the verification information received from the terminal side in the current round;
the verification information comprises terminal side security parameters and pseudo random numbers;
the pseudo-random number calculation includes:
calculating a pseudo-random number z = f (a, b) by adopting a shared deterministic pseudo-random function according to the terminal side security parameter and the base station side security parameter, wherein f is the deterministic pseudo-random function, and a and b are respectively the base station side security parameter and the terminal side security parameter; in a round of verification process, in response to f (a, b) = z not being established, candidate terminal identifications participating in verification are removed from the candidate terminal identification set; in response to f (a, b) = z being established, retaining candidate terminal identifications participating in authentication;
alternatively, the first and second electrodes may be,
according to the terminal side safety parameters and the base station side safety parameters, the shared probabilistic pseudo-random function is adopted to calculate the pseudo-random number
Figure FDA0003800617860000021
Wherein, epsilon is random noise,
Figure FDA0003800617860000022
is a probabilistic pseudo-random function; in a round of verification, in response to
Figure FDA0003800617860000023
If the number of the errors is not true, adding 1 to the error count corresponding to the candidate terminal identification participating in verification, and reserving the candidate terminal identification or removing the candidate terminal identification from the candidate terminal identification set according to a preset rule; in response to
Figure FDA0003800617860000031
If yes, keeping the error count corresponding to the candidate terminal identification participating in verification unchanged, and reserving the candidate terminal identification; the preset rule is as follows: in response to the error count exceeding a threshold, removing the candidate terminal identifier from the set of candidate terminal identifiers, and in response to the error count not exceeding the threshold, retaining the candidate terminal identifier;
a result module: and responding to the end of traversal, if only one candidate terminal identification passes all rounds of verification, the corresponding terminal access authentication passes.
4. A computer readable storage medium storing one or more programs, characterized in that: the one or more programs include instructions that, when executed by a computing device, cause the computing device to perform any of the methods of claims 1-2.
5. A computing device, characterized by: comprises the steps of (a) preparing a mixture of a plurality of raw materials,
one or more processors and one or more memories in which one or more programs are stored and configured to be executed by the one or more processors, the one or more programs including instructions for performing any of the methods of claims 1-2.
CN202110038657.7A 2021-01-12 2021-01-12 Authentication method and system for power wireless private network terminal access Active CN112887981B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110038657.7A CN112887981B (en) 2021-01-12 2021-01-12 Authentication method and system for power wireless private network terminal access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110038657.7A CN112887981B (en) 2021-01-12 2021-01-12 Authentication method and system for power wireless private network terminal access

Publications (2)

Publication Number Publication Date
CN112887981A CN112887981A (en) 2021-06-01
CN112887981B true CN112887981B (en) 2022-10-04

Family

ID=76044763

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110038657.7A Active CN112887981B (en) 2021-01-12 2021-01-12 Authentication method and system for power wireless private network terminal access

Country Status (1)

Country Link
CN (1) CN112887981B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105406971A (en) * 2015-12-09 2016-03-16 中国电力科学研究院 RFID security authentication method for intelligent electricity consumption information collection system terminal
CN108112012A (en) * 2016-11-24 2018-06-01 中国移动通信有限公司研究院 The method for network authorization and device of a kind of group endpoints
CN108964897A (en) * 2018-06-28 2018-12-07 如般量子科技有限公司 Identity authorization system and method based on group communication
CN109076339A (en) * 2016-07-13 2018-12-21 华为国际有限公司 The unified certification frame of heterogeneous network
CN109474438A (en) * 2018-12-24 2019-03-15 公安部第三研究所 It is a kind of based on the intelligent terminal access authentication method selectively revealed

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060143453A1 (en) * 2002-06-19 2006-06-29 Secured Communications, Inc Inter-authentication method and device
CN108028829A (en) * 2015-07-02 2018-05-11 瑞典爱立信有限公司 For obtaining the method being initially accessed and relevant wireless device and network node to network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105406971A (en) * 2015-12-09 2016-03-16 中国电力科学研究院 RFID security authentication method for intelligent electricity consumption information collection system terminal
CN109076339A (en) * 2016-07-13 2018-12-21 华为国际有限公司 The unified certification frame of heterogeneous network
CN108112012A (en) * 2016-11-24 2018-06-01 中国移动通信有限公司研究院 The method for network authorization and device of a kind of group endpoints
CN108964897A (en) * 2018-06-28 2018-12-07 如般量子科技有限公司 Identity authorization system and method based on group communication
CN109474438A (en) * 2018-12-24 2019-03-15 公安部第三研究所 It is a kind of based on the intelligent terminal access authentication method selectively revealed

Also Published As

Publication number Publication date
CN112887981A (en) 2021-06-01

Similar Documents

Publication Publication Date Title
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN108768660B (en) Internet of things equipment identity authentication method based on physical unclonable function
CN109243045B (en) Voting method, voting device, computer equipment and computer readable storage medium
CN107483419B (en) Method, device and system for authenticating access terminal by server, server and computer readable storage medium
CN111064711B (en) Block chain-based data stream detection method and device and server
WO2006038183A1 (en) Two-way error correction for physical tokens
CN113259311B (en) Decentralized identity authentication system based on block chain
CN109104476B (en) Electric power information safety system based on block chain
CN113268716A (en) Authorization verification system, method and device for application and storage medium
CN112887981B (en) Authentication method and system for power wireless private network terminal access
KR20200117473A (en) Apparatus and method for anomaly detection based on blockchain
CN116074061A (en) Data processing method and device for rail transit, electronic equipment and storage medium
CN103178955B (en) A kind of authentication method, equipment and system
CN109803255B (en) Mobile data information safety communication system and method for digital workshop
CN114707141A (en) Multi-party computing method and system based on block chain system
CN116707844A (en) Behavior tracking method and device based on public account number, electronic equipment and medium
CN110266708B (en) Terminal security verification system and method based on equipment cluster
TWI710243B (en) Device and method for distributing machine id, and internet-connected device
CN115829186B (en) ERP management method based on artificial intelligence and data processing AI system
CN110913388A (en) Safe clustering method and device based on wireless sensor network
CN110336659A (en) A kind of multi-party quantum key machinery of consultation, terminal and storage device
CN117332395B (en) Data management method and system for data sharing
Chen et al. A provable secure batch authentication scheme for EPCGen2 tags
CN112836228B (en) Distributed management system of data ownership based on block chain
CN115001803B (en) Mobile phone bank login method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant