CN112887983A - Equipment identity authentication method, device, equipment and medium - Google Patents

Equipment identity authentication method, device, equipment and medium Download PDF

Info

Publication number
CN112887983A
CN112887983A CN202110113430.4A CN202110113430A CN112887983A CN 112887983 A CN112887983 A CN 112887983A CN 202110113430 A CN202110113430 A CN 202110113430A CN 112887983 A CN112887983 A CN 112887983A
Authority
CN
China
Prior art keywords
equipment
requesting connection
identity
identity authentication
identity information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110113430.4A
Other languages
Chinese (zh)
Other versions
CN112887983B (en
Inventor
周游
韩毅
单宏寅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingeek Information Security Consulting Associates Co ltd
Original Assignee
Ingeek Information Security Consulting Associates Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingeek Information Security Consulting Associates Co ltd filed Critical Ingeek Information Security Consulting Associates Co ltd
Priority to CN202110113430.4A priority Critical patent/CN112887983B/en
Publication of CN112887983A publication Critical patent/CN112887983A/en
Application granted granted Critical
Publication of CN112887983B publication Critical patent/CN112887983B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The embodiment of the invention relates to the technical field of Internet of things and discloses a method, a device, equipment and a medium for equipment identity authentication. The method comprises the following steps: acquiring at least two identity authentication parameters of equipment requesting connection; calculating to obtain the connector identity information of the equipment requesting connection by adopting a preset algorithm according to at least two identity authentication parameters; and if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area, determining that the equipment requesting connection passes the identity authentication. The embodiment of the invention solves the problems that the equipment identity identification information has low confidentiality and is easy to be illegally obtained, so that the communication safety of the equipment is poor, the equipment identity identification information is difficult to crack, and the safety of the equipment can be obviously improved.

Description

Equipment identity authentication method, device, equipment and medium
Technical Field
The invention relates to the technical field of Internet of things, in particular to a method, a device, equipment and a medium for authenticating equipment identity.
Background
The safety of the equipment during communication is a foundation for the development of the technology and the application of the Internet of things. Each internet of things device has a 'digital identity card' (also called identity identification information), which is a unique identity certificate of the device in the network world. When two existing Bluetooth devices are connected for the first time, pairing is carried out, after pairing is successful, the MAC address or UUID of the Bluetooth device is stored in a trust list, and when the two Bluetooth devices are connected again, the connected device needs to determine that the MAC address or UUID of the Bluetooth device requesting connection is matched with information in the trust list. Because the identity information security of MAC address or UUID of the existing Bluetooth equipment is low, the existing Bluetooth equipment is easy to illegally obtain and the communication security of the equipment is poor.
Disclosure of Invention
The embodiment of the invention aims to provide a method, a device, equipment and a medium for authenticating equipment identity, which solve the problems of low confidentiality of equipment identity identification information, easiness in illegal acquisition and poor equipment communication safety.
In order to solve the foregoing technical problem, in a first aspect, an embodiment of the present invention provides an apparatus identity authentication method, including:
acquiring at least two identity authentication parameters of equipment requesting connection;
calculating to obtain the connector identity information of the equipment requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters;
and if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area, determining that the equipment requesting connection passes the identity authentication.
In addition, the at least two authentication parameters include:
the MAC address or UUID of the device requesting the connection, an
Key data generated in the pairing process between the device and the device requesting connection; the key data is stored in a secure storage area local to the device.
In addition, the device requesting connection is a bluetooth device, and the key data is one of the following or any combination thereof: an identity resolution key, a long-term shared key, and a short-term shared key.
In addition, the obtaining of the connector identity information of the device requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters includes:
and encrypting the MAC address or UUID of the device requesting connection by using the key data to obtain the connector identity information of the device requesting connection.
Further, generating the key data in the pairing process includes:
sending the pairing data generated by the local terminal to the opposite terminal, and receiving the pairing data sent by the opposite terminal;
and calculating to obtain the key data according to the pairing data generated by the local terminal and the pairing data sent by the opposite terminal.
In addition, the obtaining of the connector identity information of the device requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters includes:
and taking the abstract calculation result of the at least two identity authentication parameters as the connector identity information of the equipment requesting connection.
Additionally, generating the trusted identity information includes:
acquiring key data generated in the process of pairing the equipment requesting connection and the equipment and the MAC address or UUID of the equipment requesting connection;
and calculating to obtain the trusted identity information corresponding to the equipment requesting connection by adopting the preset algorithm according to the MAC address or the UUID and the key data.
In a second aspect, an embodiment of the present invention provides an apparatus for authenticating an identity of a device, including:
the parameter acquisition module is used for acquiring at least two identity authentication parameters of the equipment requesting connection;
the calculation module is used for calculating the identity information of the connetor of the equipment requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters;
and the determining module is used for determining that the equipment requesting connection passes the identity authentication if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area.
In a third aspect, an embodiment of the present invention further provides an apparatus, including: the device comprises a memory and a processor, wherein the memory stores a computer program, and the processor runs the computer program to realize the device identity authentication method according to any embodiment of the invention.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the device identity authentication method according to any embodiment of the present invention.
Compared with the prior art, the method and the device for the identity authentication are characterized in that when the devices are connected, at least two identity authentication parameters of the devices requesting connection are obtained, the connector identity information of the devices requesting connection is obtained through calculation by adopting a preset algorithm according to the at least two identity authentication parameters, and when the connector identity information is matched with the trusted identity information stored in the local safe storage area of the devices, the devices requesting connection are determined to pass the identity authentication. The embodiment of the invention discards the mode of directly adopting the identification information with low confidentiality to carry out the identification authentication, and obtains the identity information (namely the identification information) of the connector through at least two identification authentication parameters, thereby obviously improving the safety of the equipment during communication.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is understood that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a schematic flowchart of an apparatus identity authentication method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an apparatus identity authentication device according to a second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an apparatus provided in the third embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described through embodiments with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a flowchart of an apparatus identity authentication method according to an embodiment of the present invention. The technical scheme of the embodiment can be suitable for identity authentication during communication between Bluetooth devices. However, the technical solution of the present embodiment is also applicable to other types of devices as long as the devices have the same or similar authentication parameters as the bluetooth device. The method can be executed by the device for authenticating the identity of the equipment provided by the embodiment of the invention, and the device can be realized in a software and/or hardware mode and is configured on the equipment needing identity authentication. As shown in fig. 1, the method for authenticating the identity of the device in this embodiment includes the following steps:
step 101: at least two identity authentication parameters of the device requesting connection are obtained.
In this embodiment, taking the device requesting connection as a bluetooth device as an example, the at least two identity authentication parameters may include a MAC address or a UUID of the device requesting connection, and key data generated in a pairing process between the device and the device requesting connection. It is to be understood that the obtained authentication parameters are not limited to two, but may be three or more.
Specifically, each bluetooth device has a Unique MAC Address (Media Access Control Address), most bluetooth devices use the MAC Address as their Unique id information, and in some applications, the bluetooth device also uses UUID (universal Unique Identifier) as its Unique id information. The MAC address of the bluetooth device may be obtained by any one of the following methods: a, directly sending the device requesting connection to the device, wherein the device requesting connection can encrypt the MAC address and then send the MAC address or directly send the MAC address to the device without encryption when sending the MAC address; and b, the equipment requesting connection can broadcast the MAC address of the equipment, and the equipment can monitor the broadcast information to obtain the MAC address. The way to acquire the UUID is known to those skilled in the art, and is not described herein. However, in practical applications, the MAC address or the UUID may be replaced with other types of information capable of uniquely identifying the device identity, which is not specifically limited in this embodiment.
In this embodiment, the key data is stored in a local secure storage area of the device. In particular, the key data may be one or any combination of the following: identity Resolving Key (IRK), Long Term shared Key (LTK), and Short Term shared Key (STK). For example, the STK may be used as the key data, but not limited thereto, the key data may also be an IRK or an LTK, or any two or a combination of the IRK, the LTK, and the STK, and the key data used by different bluetooth devices may be the same or different. It should be noted that the type of the Key data is not limited to IRK, LTK, and STK, and other types of Key data, such as CSRK (Connection Signature Resolving Key), may also be used. Moreover, the type of the key data in this embodiment is changed with the update of the bluetooth protocol, and the present embodiment does not specifically limit the type of the key data.
Specifically, two bluetooth devices will be paired when connected for the first time, and in a bluetooth version of 4.2 or higher, the bluetooth devices will negotiate and share key data during the pairing process, that is, both devices keep the same key data, thereby encrypting and decrypting data transmitted on a bluetooth link between two subsequent bluetooth devices. Optionally, generating the key data in the pairing process may include: and sending the pairing data generated by the local terminal to the opposite terminal, receiving the pairing data sent by the opposite terminal, and calculating to obtain key data according to the pairing data generated by the local terminal and the pairing data sent by the opposite terminal. For example, the process of device a and device B negotiating and generating the key data is as follows: device a generates pairing data AD and sends it to device B, device B generates pairing data BD and sends it to device a, both devices A, B calculate the same key data according to pairing data AD and pairing data BD using the same algorithm. The pairing data AD and the pairing data BD have randomness, and the key data are not transmitted in the communication process in the generation process, so that the security of the key data is higher. And the data to be transmitted between the two parties is encrypted and decrypted through the negotiated key data, so that the security is high. The key data is stored in a secure storage area local to the device to enable the key data to be highly secure. In addition, new key data can be generated after each re-pairing, and the key data has randomness, so that the key data has better security. Those skilled in the art know that there are various bluetooth device pairing methods, and there are also various methods for generating key data through negotiation, which are not described herein again, and this embodiment does not specifically limit the generation method of the key data.
Step 102: and calculating the identity information of the connector of the equipment requiring connection by adopting a preset algorithm according to the at least two identity authentication parameters.
The identity information of the connetor corresponds to at least two identity authentication parameters one to one, namely the identity information of the connetor obtained through calculation of a preset algorithm also has uniqueness.
In this embodiment, the obtaining of the connector identity information of the device requesting connection by using a preset algorithm according to at least two identity authentication parameters may include: and encrypting the MAC address or the UUID of the device requesting connection by using the key data to obtain the connector identity information of the device requesting connection. The MAC address or the UUID may be encrypted by using the key data and using a symmetric or asymmetric encryption algorithm to obtain the identity information of the connector, which is not specifically limited in this embodiment.
As an alternative, the calculating, by using a preset algorithm, connector identity information of the device requesting connection according to at least two identity authentication parameters may include:
taking the digest calculation results of at least two identity authentication parameters as the connetor identity information of the equipment requesting connection, namely, performing digest calculation on the MAC address or UUID of the equipment requesting connection and the key data corresponding to the equipment, and taking the digest calculation results as the connetor identity information of the equipment requesting connection. It should be noted that, the embodiment does not specifically limit the specific implementation manner of the preset algorithm.
Step 103: and if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area, determining that the equipment requesting connection passes the identity authentication.
The trusted identity information can be stored in a trusted list in the local secure storage area. And if the trusted identity information matched with the connector identity information of the equipment requesting connection does not exist in the trusted list, determining that the authentication of the equipment requesting connection fails. Generating trusted identity information in a trusted list may include: the method comprises the steps of obtaining key data generated in the process of pairing the equipment requesting connection and the equipment and the MAC address or UUID of the equipment requesting connection, and obtaining the trustable identity information corresponding to the equipment requesting connection by adopting a preset algorithm according to the MAC address or UUID and the key data. It should be noted that the device generates the trusted identity information when the device is connected to the device requesting connection for the first time, and the generating manner of the trusted identity information is the same as the generating manner of the connector identity information of the device requesting connection when the device is not connected for the first time. The equipment generates trustable identity information corresponding to the equipment which is requested to be connected in the first connection pairing process, and adds the trustable identity information into the trust list. When the user manually cancels the pairing record, the equipment deletes the trusted identity information and the key data corresponding to the cancelled equipment in the trust list. When the key data corresponding to the device requesting connection is not locally stored in the device, the device requesting connection is used as a new device to execute a process of generating the key data and the trusted identity information of the new device through pairing negotiation, and the generated trusted identity information is added into a trust list. In the embodiment, the key data is used as an identity authentication parameter, the key data is not easy to expose and has high safety, and trusted identity information or connetor identity information is calculated by adopting a preset algorithm according to the key data, the MAC address of the equipment or the UUID and is used as unique identity identification information of the equipment, so that the authentication safety is further improved.
It is worth mentioning that, in order to ensure the security of the first connection process, the user may be prompted to authenticate the device requesting connection by one or more of the following methods before pairing: short message verification code, face recognition, fingerprint recognition and the like, so that the first connection has higher safety, and the safety of subsequent connection is further ensured. Moreover, different Bluetooth devices can calculate the identity information of the device by adopting different algorithms, so that the safety of the device is further improved.
Compared with the prior art, the method and the device for the identity authentication have the advantages that at least two identity authentication parameters of the device requesting connection are obtained, the connector identity information of the device requesting connection is obtained through calculation by adopting a preset algorithm according to the at least two identity authentication parameters, and when the connector identity information is matched with the trusty identity information stored in the local safe storage area of the device, the device requesting connection is determined to pass the identity authentication.
Fig. 2 is a block diagram of a device identity authentication apparatus according to a second embodiment of the present invention. The device can be configured in devices of the internet of things such as bluetooth and the like, and is used for executing the device identity authentication method provided by any embodiment. The device includes:
a parameter obtaining module 201, configured to obtain at least two identity authentication parameters of a device requesting connection; the calculation module 202 is configured to calculate, according to at least two identity authentication parameters, connector identity information of the device requesting connection by using a preset algorithm; the identity information of the connector corresponds to at least two identity authentication parameters one to one; the determining module 203 is configured to determine that the device requesting connection passes identity authentication if the identity information of the connector matches trusted identity information stored in the local secure storage area; and if the identity information of the connector is not matched with the trusted identity information stored in the local secure storage area, determining that the identity authentication of the equipment requesting for connection fails.
Optionally, the at least two authentication parameters may include: the MAC address or UUID of the device requesting connection and key data generated in the pairing process between the device and the device requesting connection; the key data is stored in a secure storage area local to the device.
Alternatively, the device requesting connection may be a bluetooth device, and the key data may be one of the following or any combination thereof: an identity resolution key, a long-term shared key, and a short-term shared key.
Optionally, the apparatus further comprises: the key data generation module is used for generating key data in the pairing process; the key data generation module may include: the pairing data generation submodule is used for sending the pairing data generated by the local terminal to the opposite terminal and receiving the pairing data sent by the opposite terminal; and the key data calculation submodule is used for calculating to obtain the key data according to the pairing data generated by the local terminal and the pairing data sent by the opposite terminal.
Optionally, the calculation module 202 is specifically configured to encrypt the MAC address or the UUID of the device requesting connection by using the key data to obtain the connector identity information of the device requesting connection.
As an alternative, the calculation module 202 may be specifically configured to use the digest calculation result of at least two items of the authentication parameters as the connector identity information of the device requesting connection.
Optionally, the apparatus may further include a trusted information generation module for generating trusted identity information. Specifically, the trusted information generation module may include: the data acquisition submodule is used for acquiring key data generated in the process of pairing the equipment requesting connection with the equipment and the MAC address or UUID of the equipment requesting connection; and the trusted identity information calculation submodule is used for calculating trusted identity information corresponding to the equipment requiring connection by adopting a preset algorithm according to the MAC address or the UUID and the key data.
Compared with the prior art, the equipment identity authentication device obtains at least two identity authentication parameters of equipment requiring connection, calculates the connector identity information of the equipment requiring connection by adopting a preset algorithm according to the at least two identity authentication parameters, and determines that the equipment requiring connection passes the identity authentication when the connector identity information is matched with the trusty identity information stored in the local safe storage area of the equipment.
Fig. 3 is a schematic structural diagram of an apparatus according to a third embodiment of the present invention. As shown in fig. 3, the apparatus includes: a memory 302, a processor 301;
wherein the memory 302 stores instructions executable by the at least one processor 301, and the instructions are executed by the at least one processor 301 to implement the device identity authentication method according to any of the foregoing embodiments.
The apparatus may include one or more processors 301 and memory 302, with one processor 301 being exemplified in fig. 3. The processor 301 and the memory 302 may be connected by a bus or other means, and fig. 3 illustrates the connection by a bus as an example. Memory 302, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The processor 301 executes various functional applications and data processing of the device by executing the nonvolatile software programs, instructions and modules stored in the memory 302, so as to implement the device identity authentication method according to any of the above embodiments.
The memory 302 may include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. Further, the memory 302 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
One or more modules are stored in the memory 302, and when executed by the one or more processors 301, perform the device identity authentication method in any of the above-described method embodiments.
The above-mentioned device can execute the method provided by the embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method, and reference may be made to the method provided by the embodiment of the present invention for technical details that are not described in detail in the embodiment.
Compared with the prior art, the equipment of the embodiment of the application obtains at least two identity authentication parameters of the equipment requesting connection, calculates the connector identity information of the equipment requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters, and determines that the equipment requesting connection passes the identity authentication when the connector identity information is matched with the trusty identity information stored in the local safe storage area of the equipment, so that the embodiment of the invention can obtain the equipment identity identification information with high confidentiality by combining the identity authentication parameters (such as key data) with higher security and the algorithm, thereby obviously improving the equipment identity authentication security.
A fourth embodiment of the present invention provides a computer-readable storage medium, configured to store a computer-readable program, where the computer-readable program is used for an apparatus to execute some or all of the above method embodiments.
That is, those skilled in the art can understand that all or part of the steps in the method according to the above embodiments may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, etc.) or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.

Claims (10)

1. An apparatus identity authentication method, comprising:
acquiring at least two identity authentication parameters of equipment requesting connection;
calculating to obtain the connector identity information of the equipment requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters;
and if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area, determining that the equipment requesting connection passes the identity authentication.
2. The method for authenticating equipment according to claim 1, wherein the at least two authentication parameters include:
the MAC address or UUID of the device requesting the connection, an
Key data generated in the pairing process between the device and the device requesting connection; the key data is stored in a secure storage area local to the device.
3. The device identity authentication method according to claim 2, wherein the device requesting connection is a bluetooth device, and the key data is one of the following or any combination thereof: an identity resolution key, a long-term shared key, and a short-term shared key.
4. The device identity authentication method according to claim 2 or 3, wherein the obtaining of the connector identity information of the device requesting connection by using a preset algorithm according to the at least two identity authentication parameters comprises:
and encrypting the MAC address or UUID of the device requesting connection by using the key data to obtain the connector identity information of the device requesting connection.
5. The device identity authentication method according to claim 2, wherein generating the key data in the pairing process comprises:
sending the pairing data generated by the local terminal to the opposite terminal, and receiving the pairing data sent by the opposite terminal;
and calculating to obtain the key data according to the pairing data generated by the local terminal and the pairing data sent by the opposite terminal.
6. The device identity authentication method according to any one of claims 1 to 3, wherein the obtaining of the connector identity information of the device requesting connection by using a preset algorithm according to the at least two identity authentication parameters includes:
and taking the abstract calculation result of the at least two identity authentication parameters as the connector identity information of the equipment requesting connection.
7. The device identity authentication method of claim 2, wherein generating the trusted identity information comprises:
acquiring key data generated in the process of pairing the equipment requesting connection and the equipment and the MAC address or UUID of the equipment requesting connection;
and calculating to obtain the trusted identity information corresponding to the equipment requesting connection by adopting the preset algorithm according to the MAC address or the UUID and the key data.
8. An apparatus for authenticating an identity of a device, comprising:
the parameter acquisition module is used for acquiring at least two identity authentication parameters of the equipment requesting connection;
the calculation module is used for calculating the identity information of the connetor of the equipment requesting connection by adopting a preset algorithm according to the at least two identity authentication parameters;
and the determining module is used for determining that the equipment requesting connection passes the identity authentication if the identity information of the connector is matched with the trusted identity information stored in the local secure storage area.
9. An apparatus, comprising: a memory storing a computer program and a processor running the computer program to implement the method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202110113430.4A 2021-01-27 2021-01-27 Equipment identity authentication method, device, equipment and medium Active CN112887983B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110113430.4A CN112887983B (en) 2021-01-27 2021-01-27 Equipment identity authentication method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110113430.4A CN112887983B (en) 2021-01-27 2021-01-27 Equipment identity authentication method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN112887983A true CN112887983A (en) 2021-06-01
CN112887983B CN112887983B (en) 2023-11-24

Family

ID=76052822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110113430.4A Active CN112887983B (en) 2021-01-27 2021-01-27 Equipment identity authentication method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN112887983B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024040406A1 (en) * 2022-08-22 2024-02-29 华为技术有限公司 Communication method, apparatus and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184204A (en) * 2007-12-25 2008-05-21 天柏宽带网络科技(北京)有限公司 Authentication method for interdynamic television service
CN103109510A (en) * 2012-10-16 2013-05-15 华为技术有限公司 Resource safety access method and device
EP3073704A1 (en) * 2015-03-23 2016-09-28 Comarch Technologies Spólka z Ograniczona Odpowiedzialnoscia Method of data securing transmitted over bluetooth and transmitter device transmitting secured data over bluetooth
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN111277575A (en) * 2020-01-14 2020-06-12 广州交通信息化建设投资营运有限公司 Driver identity recognition method and device, computer equipment and storage medium
CN112261012A (en) * 2020-09-30 2021-01-22 北京鸿联九五信息产业有限公司 Browser, server and webpage access method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184204A (en) * 2007-12-25 2008-05-21 天柏宽带网络科技(北京)有限公司 Authentication method for interdynamic television service
CN103109510A (en) * 2012-10-16 2013-05-15 华为技术有限公司 Resource safety access method and device
EP3073704A1 (en) * 2015-03-23 2016-09-28 Comarch Technologies Spólka z Ograniczona Odpowiedzialnoscia Method of data securing transmitted over bluetooth and transmitter device transmitting secured data over bluetooth
CN110611905A (en) * 2019-08-09 2019-12-24 华为技术有限公司 Information sharing method, terminal device, storage medium, and computer program product
CN111277575A (en) * 2020-01-14 2020-06-12 广州交通信息化建设投资营运有限公司 Driver identity recognition method and device, computer equipment and storage medium
CN112261012A (en) * 2020-09-30 2021-01-22 北京鸿联九五信息产业有限公司 Browser, server and webpage access method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王利涛: ""蓝牙身份认证与访问控制技术研究"", 《中国优秀硕士学位论文全文数据库》, no. 07, pages 6 - 22 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024040406A1 (en) * 2022-08-22 2024-02-29 华为技术有限公司 Communication method, apparatus and system

Also Published As

Publication number Publication date
CN112887983B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
CN110519260B (en) Information processing method and information processing device
CN110750803B (en) Method and device for providing and fusing data
JP6226197B2 (en) Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method
CN108111497B (en) Mutual authentication method and device for camera and server
CN112751821B (en) Data transmission method, electronic equipment and storage medium
JP2005102163A (en) Equipment authentication system, server, method and program, terminal and storage medium
WO2019019887A1 (en) Server authentication method, apparatus and system for terminal access, server and computer readable storage medium
US11146554B2 (en) System, method, and apparatus for secure identity authentication
CN111614621B (en) Internet of things communication method and system
TW200402981A (en) Methods for remotely changing a communications password
CN113225352B (en) Data transmission method and device, electronic equipment and storage medium
CN112351037B (en) Information processing method and device for secure communication
KR20150079489A (en) Instant messaging method and system
CN111526007B (en) Random number generation method and system
US20210392004A1 (en) Apparatus and method for authenticating device based on certificate using physical unclonable function
CN110635901A (en) Local Bluetooth dynamic authentication method and system for Internet of things equipment
CN110690969A (en) Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties
CN109451504B (en) Internet of things module authentication method and system
CN112989316B (en) ADB authorization authentication method and system
CN112887983B (en) Equipment identity authentication method, device, equipment and medium
KR102415628B1 (en) Method and apparatus for authenticating drone using dim
CN112487380A (en) Data interaction method, device, equipment and medium
CN112637249B (en) Internet of things node identification authentication method and device, electronic equipment and storage medium
CN115834077B (en) Control method, control system, electronic device and storage medium
US10491385B2 (en) Information processing system, information processing method, and recording medium for improving security of encrypted communications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant