CN113098861B - Active identification carrier, authentication method thereof and service platform - Google Patents

Active identification carrier, authentication method thereof and service platform Download PDF

Info

Publication number
CN113098861B
CN113098861B CN202110340964.0A CN202110340964A CN113098861B CN 113098861 B CN113098861 B CN 113098861B CN 202110340964 A CN202110340964 A CN 202110340964A CN 113098861 B CN113098861 B CN 113098861B
Authority
CN
China
Prior art keywords
identification carrier
active identification
active
carrier
service platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110340964.0A
Other languages
Chinese (zh)
Other versions
CN113098861A (en
Inventor
贾雪琴
孙阳阳
林晨
史可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Unicom Vsens Telecommunications Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Unicom Vsens Telecommunications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd, Unicom Vsens Telecommunications Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202110340964.0A priority Critical patent/CN113098861B/en
Publication of CN113098861A publication Critical patent/CN113098861A/en
Application granted granted Critical
Publication of CN113098861B publication Critical patent/CN113098861B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides an active identification carrier, an authentication method thereof and a service platform, relates to the technical field of industry, and is used for realizing safety authentication of the active identification carrier and ensuring the safety and accuracy of acquired information. The method comprises the following steps: the active identification carrier sends a first request message to an active identification carrier service platform; the first request message includes an active identification carrier identification; the active identification carrier service platform receives a first request message sent by an active identification carrier; the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message includes the target identity credential; the active identification carrier receives a first request response message sent by the active identification carrier service platform. The method and the device are used for distributing the identity certificate for the active identification carrier.

Description

Active identification carrier, authentication method thereof and service platform
Technical Field
The application relates to the technical field of industry, in particular to an active identification carrier, an authentication method thereof and a service platform.
Background
The industrial Internet identification analysis system is an important component of an industrial Internet network architecture, is an infrastructure for supporting industrial Internet network interconnection and intercommunication, and is a core key for realizing industrial Internet data sharing. The industrial Internet identification code refers to an identity symbol capable of uniquely identifying physical resources such as machines, products and the like and virtual resources such as algorithms, procedures and the like; the industrial Internet identification analysis system refers to a system device capable of inquiring the network position of a target object or related information according to industrial Internet identification codes, and is used for uniquely positioning and inquiring information of machines and articles, and is a precondition and foundation for realizing accurate butt joint of a global supply chain system and an enterprise production system, full life cycle management of products and intelligent service.
The industrial Internet identification analysis system can store information of the machine or the product through the identification carrier, so that management of the corresponding machine or product is realized. At present, the management of the information in the identification carrier is mainly realized by a single reading or reporting mode, and because the identification carrier included in the industrial Internet identification analysis system comprises thousands of identification carriers, the information management operation by the mode is complex, and the batch management of the information of the identification carrier can be realized by remote communication, but the identification carrier is easy to forge, so that a safety authentication method of the identification carrier is also required for the batch management of the identification carrier so as to ensure the accuracy of the information acquisition of the industrial Internet identification analysis system.
Disclosure of Invention
The embodiment of the application provides an active identification carrier, an authentication method and a service platform thereof, which are used for realizing the safety authentication of the active identification carrier and ensuring the safety and accuracy of acquired information.
In order to achieve the above purpose, the embodiment of the present application adopts the following technical scheme:
in a first aspect, an active identifier carrier authentication method is provided, applied to an active identifier carrier management system, where the active identifier carrier management system includes an active identifier carrier and an active identifier carrier service platform, and the method includes: the active identification carrier service platform receives a first request message sent by an active identification carrier; the first request message includes an active identification carrier identification; the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message includes the target identity credential.
In a second aspect, an active identification carrier authentication method is provided, which is applied to an active identification carrier management system, where the active identification carrier management system includes an active identification carrier and an active identification carrier service platform, and includes: the active identification carrier sends a first request message to an active identification carrier service platform; the first request message includes an active identification carrier identification; the active identification carrier receives a first request response message sent by an active identification carrier service platform; the first request response message includes the target identity credential.
In a third aspect, an active identifier carrier service platform is provided, including: the receiving module is used for receiving a first request message sent by the active identification carrier; the first request message includes an active identification carrier identification; the processing module is used for determining a target identity credential according to the active identification carrier identification received by the receiving module and the target algorithm; the sending module is used for returning a first request response message to the active identification carrier; the first request response message includes the target identity credential.
In a fourth aspect, an active identification carrier is provided, comprising: the sending module is used for sending a first request message to the active identification carrier service platform; the first request message includes an active identification carrier identification; the receiving module is used for receiving a first request response message sent by the active identification carrier service platform; the first request response message includes the target identity credential.
In a fifth aspect, an active identifier carrier service platform is provided, including: memory, processor, bus and communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus; when the active identification carrier service platform runs, the processor executes computer-executable instructions stored in the memory to cause the active identification carrier service platform to perform the active identification carrier authentication method as provided in the first aspect.
In a sixth aspect, there is provided a computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the active identity carrier authentication method as provided in the first aspect.
In a seventh aspect, an active identification carrier is provided, comprising: memory, processor, bus and communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through a bus; when the active identification carrier is running, the processor executes computer-executable instructions stored in the memory to cause the active identification carrier to perform the active identification carrier authentication method as provided in the second aspect.
In an eighth aspect, there is provided a computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the active identity carrier authentication method as provided in the second aspect.
The active identification carrier authentication method provided by the embodiment of the application is applied to an active identification carrier management system, wherein the active identification carrier management system comprises an active identification carrier and an active identification carrier service platform, and the method comprises the following steps: the active identification carrier sends a first request message to an active identification carrier service platform; the first request message includes an active identification carrier identification; the active identification carrier service platform receives a first request message sent by an active identification carrier; the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message includes the target identity credential; the active identification carrier receives a first request response message sent by the active identification carrier service platform. The active identification carrier authentication method provided by the embodiment of the application can be used for enabling the active identification carrier to store the corresponding identity credentials by the identity credentials generated by the active identification carrier service platform for the active identification carrier and sending the identity credentials to the active identification carrier; when the active identification carrier and the active identification carrier service platform are in communication, the identity of the corresponding active identification carrier can be verified through the identity certificate, so that the safety of the communication between the active identification carrier and the active identification carrier service platform is ensured.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an active identifier carrier management system according to an embodiment of the present application;
fig. 2 is a second schematic diagram of an active identifier carrier management system according to an embodiment of the present application;
fig. 3 is a schematic flow chart of an active identifier carrier verification method according to an embodiment of the present application;
FIG. 4 is a second flow chart of an active identifier carrier verification method according to an embodiment of the present application;
fig. 5 is a third flow chart of an active identifier carrier verification method according to an embodiment of the present application;
fig. 6 is a flow chart of a method for verifying an active identifier carrier according to an embodiment of the present application;
fig. 7 is a flowchart of an active identifier carrier verification method according to an embodiment of the present application;
Fig. 8 is a schematic structural diagram of an active identifier carrier service platform according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an active identifier carrier according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of another active identifier carrier service platform according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of another active identifier carrier according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that, in the embodiments of the present application, words such as "exemplary" or "such as" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g." in an embodiment should not be taken as preferred or advantageous over other embodiments or designs. Rather, the use of words such as "exemplary" or "such as" is intended to present related concepts in a concrete fashion.
It should be noted that, in the embodiment of the present application, "english: of", "corresponding" and "corresponding" may sometimes be used in combination, and it should be noted that the meaning to be expressed is consistent when the distinction is not emphasized.
In order to clearly describe the technical solution of the embodiments of the present application, in the embodiments of the present application, the terms "first", "second", etc. are used to distinguish the same item or similar items having substantially the same function and effect, and those skilled in the art will understand that the terms "first", "second", etc. are not limited in number and execution order.
Some technical terms related to the embodiments of the present application are described below.
Identification carrier: refers to a tag that carries an identification code resource. The identification carriers can be divided into an active identification carrier and a passive identification carrier according to whether the identification carriers can actively interact with the identification data read-write equipment, the identification analysis service node, the identification data application platform and the like.
Active identification carrier: the industrial internet identification code and necessary security certificates, algorithms and keys thereof can be embedded into industrial equipment, have a networking communication function, and can actively initiate connection to an identification analysis service node or an identification data application platform and the like without triggering by means of identification read-write equipment. The active identification carrier can be a universal integrated circuit card (universal integrated circuit card, UICC), a communication module, a micro control unit (micro controller unit, MCU) and the like.
Passive identification carrier: refers to the attachment to the surface of industrial equipment or products for reading by a reader. In the industrial internet, the passive identification carrier generally carries industrial internet identification codes, lacks remote network connection capability, and needs to rely on an identification reader-writer to initiate an identification analysis request to an identification analysis server. The passive identification carrier may be a one-dimensional bar code, a two-dimensional bar code, radio frequency identification technology (Radio Frequency Identification, RFID), near field communication (near field communication, NFC), etc.
The passive identification carrier is required to realize the writing and reading of the recorded information by the identification reader-writer, so that the reading and writing of the single body can be realized only; while the active identification carrier can realize remote batch management of the identification carrier, the active identification carrier has the risk of being counterfeited, so that the batch management of the active identification carrier also needs to ensure the safety of the stored information. In order to realize batched management of the identification carriers and ensure the safety of the identification carriers, the embodiment of the application provides an active identification carrier authentication method, which realizes the identity authentication of the active identification carriers through an active identification carrier service platform and distributes identity certificates for the active identification carriers, thereby ensuring the safety of the active identification carriers which subsequently participate in batched management.
As shown in fig. 1, an embodiment of the present application provides an active identification carrier management system, which includes an active identification carrier 01 and an active identification carrier service platform 02.
The active identification carrier 01 is used for storing related information of industrial products, such as industrial identifications of the industrial products; the active identification carrier 01 is also used for communicating with the active identification carrier service platform 02 to realize the management of the stored information. The active identifier carrier 01 can be UICC, MCU, communication module and other components.
The active identification carrier service platform 02 is used for communicating with an enterprise information system and realizing information management of the active identification carrier 01, such as adding, deleting and the like of information stored in the active identification carrier 01; the active identification carrier service platform 02 is further used for verifying the identity of the active identification carrier 01. The active identifier carrier service platform 02 may be one server in a server cluster (including a plurality of servers), or may be a chip in the one server, or may be a system on a chip in the one server, or may be implemented by a Virtual Machine (VM) deployed on a physical machine.
Since the active identifier carrier 01 is usually a UICC and other components and does not have independent communication capability, in practice, the active identifier carrier 01 needs to be configured with a corresponding terminal, so that the active identifier carrier 01 can communicate with the active identifier carrier service platform 02 and the enterprise information system 03 through the terminal.
Optionally, as shown in fig. 2, the active identification carrier management system may further include an enterprise information system 03.
And the enterprise information system 03 is used for managing the information in the active identification carrier 01 through the active identification carrier service platform 02. The enterprise information system 03 herein may be an application deployed on a computer.
It should be noted that, the foregoing only exemplifies some functions of the active identifier carrier 01, the active identifier carrier service platform 02 and the enterprise information system 03, and in practice, those skilled in the art may further configure other functions for the active identifier carrier 01, the active identifier carrier service platform 02 and the enterprise information system 03 according to the needs, which are not described herein in detail.
The embodiment of the application provides an active identification carrier authentication method which is applied to the active identification carrier management system. As shown in fig. 3, the method includes:
s101, an active identification carrier sends a first request message to an active identification carrier service platform.
Wherein the first request message includes an active identification bearer identification.
Specifically, when the industrial enterprise uses the active identification carrier to identify corresponding industrial product information, the active identification carrier needs to request corresponding identity credentials from the active identification carrier service platform so as to ensure the uniqueness of the active identification carrier and avoid the situation of forging the active identification carrier. The first request message is used for requesting the active identification carrier service platform to distribute the identity credential for the active identification carrier so as to ensure the uniqueness and the security of the active identification carrier.
It should be noted that, since the active identifier carrier is generally a UICC, an MCU, a communication module, and other components, and does not have communication capability when they exist alone, it is also necessary to configure a corresponding terminal for the active identifier carrier, so that the active identifier carrier can adapt to the corresponding terminal and communicate with the active identifier carrier service platform through the corresponding terminal.
In some embodiments, the active identifier carrier may be UICC, MCU, communication module, etc., so the active identifier carrier identifier may also be different identifier information. For example, when the active identification carrier is a UICC, the corresponding active identification carrier identification may be an integrated circuit card identification code (integrate circuit card identity, ICCID); when the active identification carrier is a communication module, the corresponding active identification carrier identification can be a unique identification, such as TX0001, allocated to the active identification carrier by a manufacturer.
S102, the active identification carrier service platform receives a first request message sent by the active identification carrier.
S103, the active identification carrier service platform determines a target identity certificate according to the active identification carrier identification and a target algorithm.
Specifically, after receiving the first request message, the active identifier carrier service platform may generate, according to a corresponding target algorithm, a target identity credential for a corresponding active identifier carrier according to an active identifier carrier identifier carried in the first request message.
In some embodiments, the target algorithm herein may be set as desired by those skilled in the art; for example, the target algorithm may be an SM2 cryptographic algorithm, a message digest algorithm (Message Digest Algorithm, md5), or the like. Different identity certificates can be formulated for the corresponding active identification carriers according to the identification of the active identification carriers according to different target algorithms, for example, corresponding signature certificates can be formulated for the active identification carriers according to SM2 cryptographic algorithm, and the signature certificates are used as the identity certificates of the active identification carriers; for example, corresponding key information can be formulated for the active identification carrier according to the MD5 algorithm, and the key information is used as an identity credential of the active identification carrier. Of course, those skilled in the art may also formulate a corresponding identity credential for the active identifier carrier according to other algorithms, which is not limited to the embodiment of the present application.
In some embodiments, the first request message may further include other relevant information of the active identification carrier, for example, information of a key, a security certificate, etc. formulated for the manufacturer of the active identification carrier. The process of generating the target identity credential by the active identifier carrier service platform according to the information such as the active identifier carrier identifier and the key carried by the first request message may refer to the technical means commonly used in the art, and will not be described herein.
S104, the active identification carrier service platform returns a first request response message to the active identification carrier.
Wherein the first request response message includes the target identity credential.
S105, the active identification carrier receives a first request response message sent by the active identification carrier service platform.
Specifically, after generating a corresponding target identity credential for the active identity carrier, the active identity carrier service platform may send the target identity credential to the active identity carrier through a first request response message; after receiving the first request response message, the active identification carrier can store the target identity certificate carried by the first request response message, so that the active identification carrier can establish mutual safety communication through the target identity certificate in subsequent communication with the active identification carrier service platform, and the false active identification carrier is prevented from accessing the active identification carrier management system.
Optionally, the active identifier carrier and the active identifier carrier service platform both include corresponding keys (public key and private key), where the keys may be set by a manufacturer of the active identifier carrier and the active identifier carrier service platform when shipped from the factory, and the active identifier carrier service platform may be provided by the same manufacturer, so that the active identifier carrier may preset a first public key of the active identifier carrier service platform before shipment, and the active identifier carrier service platform may preset a second public key of the active identifier carrier before shipment.
The first request response message may include information such as the target identity credential, the active identification carrier identifier, and the correspondence between the target identity credential and the active identification carrier identifier. Because the second public key of the active identification carrier is stored in the active identification carrier service platform, the active identification carrier service platform can encrypt the first request response message by using the second public key, sign the first request response message by using the first private key of the active identification carrier service platform, and then send the encrypted and signed first request response message to the active identification carrier.
Because the first public key of the active identification carrier service platform is stored in the active identification carrier, the active identification carrier can verify the signature of the first request response message by using the first public key after receiving the first request response message; after the signature of the first request response message is successfully verified by the active identification carrier, the encrypted first request response message can be decrypted by using the second private key of the active identification carrier, so that information such as a target identity credential carried by the first request response message, an active identification carrier identifier, a corresponding relation between the target identity credential and the active identification carrier identifier and the like are determined. Of course, after the signature verification of the first request response message fails, the active identification carrier cannot acquire the corresponding identity credential, and at this time, the authentication process of the active identification carrier is ended.
It should be noted that, the first public key and the first private key are key information of the active identifier carrier service platform, and the first public key corresponds to the first private key; similarly, the second public key and the second private key are key information of the active identification carrier, and the second public key and the second private key correspond to each other.
Optionally, the active identification carrier is used for identifying products of industrial enterprises, and the active identification carrier service platform can be provided by manufacturers of the active identification carriers, so that the corresponding industrial enterprises can use the active identification carriers conveniently, and the active identification carrier management system can further comprise an enterprise information system, so that the industrial enterprises can manage the active identification carriers through the enterprise information system conveniently. Therefore, after the identity authentication of the active identity carrier is achieved through the above steps, as shown in fig. 4, the active identity carrier authentication method may further include:
s106, the active identification carrier sends a first request completion message to the enterprise information system.
The first request completion message is used for indicating that the active identification carrier authentication is completed.
Specifically, the first request completion message herein may include the active identification carrier identifier corresponding to the active identification carrier, and the corresponding identity credential. After receiving the first request completion message, the enterprise information system can determine that the active identification carrier service platform has distributed identity credentials for the active identification carrier; at this time, the enterprise information system can realize the management of the corresponding active identification carrier through the active identification carrier service platform.
Optionally, before the active identification carrier service platform distributes the identity credential for the active identification carrier, the active identification carrier also needs to register with the active identification carrier service platform, so as to facilitate legal access of the active identification carrier to the active identification carrier service platform, and enable the active identification carrier service platform to distribute the identity credential for the active identification carrier. Thus, prior to step S101, as shown in fig. 5, the above method further includes:
s201, the active identification carrier sends a first registration request message to the active identification carrier service platform.
Wherein the first registration request message includes an active identification bearer identification.
S202, the active identification carrier service platform receives a first registration request message sent by an active identification carrier.
S203, the active identification carrier service platform returns a first registration request response message to the active identification carrier.
The first registration request response message is used for indicating that the active identification carrier is registered.
S204, the active identification carrier receives a first registration request response message sent by the active identification carrier service platform.
Specifically, steps S201 to S204 are a process of registering the active identifier carrier with the active identifier carrier service platform, where the active identifier carrier service platform may store the active identifier carrier identifier carried by the first registration request message.
After the active identification carrier service platform stores the corresponding active identification carrier identification, the identity identification can be allocated to the corresponding active identification carrier. For example, when the active identification carrier service platform stores the first active identification carrier identification, if the first active identification carrier requests an identity credential from the active identification carrier service platform through a first request message, the active identification carrier service platform may match the active identification carrier identification carried in the first request message with the first active identification carrier identification in the first request message; if the two are matched, the active identification carrier service platform can execute the active identification carrier authentication method provided by the embodiment, so that corresponding identity credentials are distributed for the active identification carrier; if the two are not matched, the active identification carrier service platform can refuse to distribute the identity certificate for the active identification carrier.
Optionally, the first registration request response message may further include a first password. The first password may be an access password generated by the active identification carrier service platform, so that the active identification carrier is legally accessed to the active identification carrier service platform. Because the first password is generated by the active identification carrier service platform, the first password is stored in the active identification carrier service platform, and meanwhile, the active identification carrier can also store the first password through a first registration request response message. Therefore, when the subsequent active identification carrier communicates with the active identification carrier service platform, the active identification carrier can be legally accessed to the active identification carrier service platform through the first password.
Further, as shown in fig. 6, before step S103, the active identifier carrier service platform may further perform the following steps:
s301, determining that the first password is matched with the second password.
Specifically, the second password is the first password generated by the active identifier carrier service platform. After the active identification carrier service platform receives the first request message, the first password carried in the first request message can be matched with the second password stored in the active identification carrier service platform, and if the first password is matched with the second password, the active identification carrier service platform executes step S103; if the first password is not matched with the second password, the active identification carrier service platform refuses the access of the active identification carrier, and the active identification carrier authentication method provided by the embodiment of the application can be ended at the moment.
It should be noted that, the first password may be set by those skilled in the art according to need, for example, when the active identifier carrier is UICC, the first password may be a personal identification code (personal identification number, PIN). Of course, the first password may be other password information that is conventional in the art, and will not be described herein.
In some embodiments, before step S101, the method may further include:
s100a, the active identification carrier sends a first access request message to the active identification carrier service platform.
Wherein the first access request message includes a first password.
And S100b, if the active identification carrier service platform determines that the first password is matched with the second password, a first access request response message is returned to the active identification carrier.
The first access request response message is used for indicating that the active identification carrier is successfully accessed.
Specifically, the active identification carrier may also access the active identification carrier service platform through steps S100a-S100b before requesting the identity credential from the active identification carrier service platform. At this time, the active identification carrier service platform matches the first password carried by the first access request message with the second password stored by itself, if the two passwords match, the active identification carrier service platform returns a first access request response message to the active identification carrier, and the active identification carrier continues to execute step S101; if the first access request rejection message and the second access request rejection message are not matched, the active identification carrier service platform returns a first access request rejection message to the active identification carrier for indicating the active identification carrier service platform to reject the access of the active identification carrier, and the embodiment of the application is ended at the moment.
In some embodiments, the active identifier carrier may further obtain the first password through the first message, where the first password is no longer included in the first registration request response message. At this time, as shown in fig. 7, after step S202, the above-mentioned registration procedure of the active identification carrier may further include:
s401, the active identification carrier service platform sends a first message to the active identification carrier.
Wherein the first message includes a first password.
S402, the active identification carrier returns a first response message to the active identification carrier service platform.
The first response message is used for indicating that the active identification carrier stores the first password.
Specifically, after the active identification carrier sends a first registration request message to the active identification carrier service platform, the active identification carrier service platform can return a first password to the active identification carrier through the first message so that the subsequent active identification carrier can be accessed to the active identification carrier service platform legally; after the active identification carrier stores the first password, the active identification carrier service platform can be informed of the active identification carrier that the first password is stored through the first response message. At this time, the active identifier carrier service platform may execute step S203.
In some embodiments, the active identifier carrier may obtain the first public key through a first registration request response message, and the active identifier carrier service platform may obtain the second public key through the first registration request message. At this time, the first public key is not required to be stored in the active identification carrier in a manner preset by the manufacturer, and the second public key is not required to be stored in the active identification carrier service platform in a manner preset by the manufacturer. Of course, the foregoing presetting and the method of obtaining the public key of the opposite end (the active identifier carrier or the active identifier carrier service platform) through the registration process are merely exemplary, and those skilled in the art may also obtain the corresponding public key information through other signaling messages therebetween, which is not limited in the embodiment of the present application.
The active identification carrier authentication method provided by the embodiment of the application is applied to an active identification carrier management system, wherein the active identification carrier management system comprises an active identification carrier and an active identification carrier service platform, and the method comprises the following steps: the active identification carrier sends a first request message to an active identification carrier service platform; the first request message includes an active identification carrier identification; the active identification carrier service platform receives a first request message sent by an active identification carrier; the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message includes the target identity credential; the active identification carrier receives a first request response message sent by the active identification carrier service platform. The active identification carrier authentication method provided by the embodiment of the application can be used for enabling the active identification carrier to store the corresponding identity credentials by the identity credentials generated by the active identification carrier service platform for the active identification carrier and sending the identity credentials to the active identification carrier; when the active identification carrier and the active identification carrier service platform are in communication, the identity of the corresponding active identification carrier can be verified through the identity certificate, so that the safety of the communication between the active identification carrier and the active identification carrier service platform is ensured.
As shown in fig. 8, an embodiment of the present application provides an active identifier carrier service platform 50, including:
a receiving module 501, configured to receive a first request message sent by an active identifier carrier; the first request message includes an active identification bearer identification.
The processing module 502 is configured to determine the target identity credential according to the active identification carrier identifier and the target algorithm received by the receiving module 501.
A sending module 503, configured to return a first request response message to the active identifier carrier; the first request response message includes the target identity credential.
Optionally, the first request message further includes a first password, and the active identifier carrier service platform includes a second password. The processing module 502 is further configured to determine that the first password matches the second password.
Optionally, the receiving module 501 is further configured to receive a first registration request message sent by the active identifier carrier; the first registration request message includes an active identification bearer identification.
The sending module 503 is further configured to return a first registration request response message to the active identifier carrier; the first registration request response message is used to indicate that the active identification bearer has been registered.
As shown in fig. 9, an embodiment of the present application further provides an active identifier carrier 60, including:
A sending module 601, configured to send a first request message to an active identifier carrier service platform; the first request message includes an active identification bearer identification.
A receiving module 602, configured to receive a first request response message sent by the active identifier bearer service platform; the first request response message includes the target identity credential.
Optionally, the sending module 601 is further configured to send a first registration request message to the active identifier carrier service platform; the first registration request message includes an active identification carrier identification;
the receiving module 602 is further configured to receive a first registration request response message sent by the active identifier carrier service platform; the first registration request response message includes a first password.
In the embodiment of the application, an active identification carrier sends a first request message to an active identification carrier service platform; the first request message includes an active identification carrier identification; the active identification carrier service platform receives a first request message sent by an active identification carrier; the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message includes the target identity credential; the active identification carrier receives a first request response message sent by the active identification carrier service platform. The embodiment of the application can generate the identity certificate for the active identification carrier through the active identification carrier service platform and send the identity certificate to the active identification carrier so that the active identification carrier stores the corresponding identity certificate; when the active identification carrier and the active identification carrier service platform are in communication, the identity of the corresponding active identification carrier can be verified through the identity certificate, so that the safety of the communication between the active identification carrier and the active identification carrier service platform is ensured.
As shown in fig. 10, the embodiment of the present application further provides another active identifier carrier service platform, which includes a memory 71, a processor 72, a bus 73, and a communication interface 74; the memory 71 is used for storing computer-executed instructions, and the processor 72 is connected with the memory 71 through the bus 73; when the active identification carrier service platform is running, the processor 72 executes computer-executable instructions stored in the memory 71 to cause the active identification carrier service platform to perform the active identification carrier authentication method as provided in the above-described embodiments.
In a particular implementation, as one embodiment, the processor 72 (72-1 and 72-2) may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 10. And as one example the active identification carrier service platform may include a plurality of processors 72, such as processor 72-1 and processor 72-2 shown in fig. 10. Each of these processors 72 may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). The processor 72 herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The memory 71 may be, but is not limited to, a read-only memory 71 (ROM) or other type of static storage device that may store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that may store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (compact disc read-only memory) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 71 may be stand alone and may be coupled to the processor 72 via a bus 73. Memory 71 may also be integrated with processor 72.
In a specific implementation, the memory 71 is used for storing data in the present application and computer-executable instructions corresponding to a software program for executing the present application. The processor 72 may actively identify various functions of the carrier service platform by running or executing software programs stored in the memory 71 and invoking data stored in the memory 71.
The communication interface 74, uses any transceiver-like device for communicating with other devices or communication networks, such as a control system, a radio access network (radio access network, RAN), a wireless local area network (wireless local area networks, WLAN), etc. The communication interface 74 may include a receiving unit to implement a receiving function and a transmitting unit to implement a transmitting function.
Bus 73 may be an industry standard architecture (industry standard architecture, ISA) bus, an external device interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus 73 may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, only one thick line is shown in fig. 10, but not only one bus or one type of bus.
The embodiment of the application also provides a computer readable storage medium, which comprises computer execution instructions, when the computer execution instructions run on a computer, the computer is caused to execute the active identification carrier authentication method provided by the embodiment.
The embodiment of the application also provides a computer program which can be directly loaded into a memory and contains software codes, and the computer program can realize the active identification carrier authentication method provided by the embodiment after being loaded and executed by a computer.
As shown in fig. 11, the embodiment of the present application further provides another active identification carrier, which includes a memory 81, a processor 82, a bus 83, and a communication interface 84; the memory 81 is used for storing computer execution instructions, and the processor 82 is connected with the memory 81 through the bus 83; when the active identification carrier is running, the processor 82 executes computer-executable instructions stored in the memory 81 to cause the active identification carrier to perform the active identification carrier authentication method as provided in the above-described embodiments.
In a particular implementation, as one embodiment, the processors 82 (82-1 and 82-2) may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 11. And as one example the active identification carrier may include a plurality of processors 82, such as processor 82-1 and processor 82-2 shown in fig. 11. Each of these processors 82 may be a single-core processor (single-CPU) or a multi-core processor (multi-CPU). The processor 82 herein may refer to one or more devices, circuitry, and/or processing cores for processing data (e.g., computer program instructions).
The memory 81 may be, but is not limited to, a read-only memory 81 (ROM) or other type of static storage device that can store static information and instructions, a random access memory (random access memory, RAM) or other type of dynamic storage device that can store information and instructions, or an electrically erasable programmable read-only memory (electrically erasable programmable read-only memory, EEPROM), a compact disc read-only memory (compact disc read-only memory) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 81 may be a stand alone memory coupled to the processor 82 via a bus 83. The memory 81 may also be integrated with the processor 82.
In a specific implementation, the memory 81 is used for storing data in the present application and computer-executable instructions corresponding to a software program for executing the present application. The processor 82 may actively identify various functions of the carrier by running or executing software programs stored in the memory 81 and invoking data stored in the memory 81.
The communication interface 84 uses any transceiver-like means for communicating with other devices or communication networks, such as a control system, a radio access network (radio access network, RAN), a wireless local area network (wireless local area networks, WLAN), etc. The communication interface 84 may include a receiving unit to implement a receiving function and a transmitting unit to implement a transmitting function.
Bus 83 may be an industry standard architecture (industry standard architecture, ISA) bus, an external device interconnect (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus 83 may be classified into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 11, but not only one bus or one type of bus.
The embodiment of the application also provides a computer readable storage medium, which comprises computer execution instructions, when the computer execution instructions run on a computer, the computer is caused to execute the active identification carrier authentication method provided by the embodiment.
The embodiment of the application also provides a computer program which can be directly loaded into a memory and contains software codes, and the computer program can realize the active identification carrier authentication method provided by the embodiment after being loaded and executed by a computer.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and the division of modules or units, for example, is merely a logical function division, and other manners of division are possible when actually implemented. For example, multiple units or components may be combined or may be integrated into another device, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form. The units described as separate parts may or may not be physically separate, and the parts shown as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed in a plurality of different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units. The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a device (may be a single-chip microcomputer, a chip or the like) or a processor (processor) to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk, etc.
The foregoing is merely illustrative of the present application, and the present application is not limited thereto, and any changes or substitutions easily contemplated by those skilled in the art within the scope of the present application should be included in the present application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (12)

1. An active identification carrier authentication method is characterized by being applied to an active identification carrier management system, wherein the active identification carrier management system comprises an active identification carrier and an active identification carrier service platform, and the method comprises the following steps:
the active identification carrier service platform receives a first request message sent by the active identification carrier; the first request message includes an active identification carrier identification;
the active identification carrier service platform determines a target identity credential according to the active identification carrier identification and a target algorithm; wherein the target algorithm comprises: the SM2 cryptographic algorithm is used for formulating a corresponding signature certificate for the active identification carrier, and taking the signature certificate as an identity credential of the active identification carrier; the information summarization algorithm is used for formulating corresponding key information for the active identification carrier and taking the key information as an identity credential of the active identification carrier;
the active identification carrier service platform returns a first request response message to the active identification carrier; the first request response message comprises the target identity credential, the active identification carrier identifier and the corresponding relation between the target identity credential and the active identification carrier identifier;
The first request message further comprises a first password, and the active identification carrier service platform comprises a second password; before the active identification carrier service platform determines the target identity credential according to the active identification carrier identification and the target algorithm, the active identification carrier service platform further comprises:
and determining that the first password is matched with the second password.
2. The method for authenticating an active identifier carrier according to claim 1, wherein before the active identifier carrier service platform receives the first request message sent by the active identifier carrier, the method further comprises:
the active identification carrier service platform receives a first registration request message sent by the active identification carrier; the first registration request message includes the active identification carrier identification;
the active identification carrier service platform returns a first registration request response message to the active identification carrier; the first registration request response message is used for indicating that the active identification carrier is registered.
3. An active identification carrier authentication method is characterized by being applied to an active identification carrier management system, wherein the active identification carrier management system comprises an active identification carrier and an active identification carrier service platform, and the method comprises the following steps:
The active identification carrier sends a first request message to the active identification carrier service platform; the first request message comprises an active identification carrier identification; the first request message is used for the active identifier carrier service platform to execute a target operation, and the target operation comprises: determining a target identity credential according to the active identification carrier identification and a target algorithm; wherein the target algorithm comprises: the SM2 cryptographic algorithm is used for formulating a corresponding signature certificate for the active identification carrier, and taking the signature certificate as an identity credential of the active identification carrier; the information summarization algorithm is used for formulating corresponding key information for the active identification carrier and taking the key information as an identity credential of the active identification carrier;
the active identification carrier receives a first request response message sent by the active identification carrier service platform; the first request response message includes the target identity credential, the active identification carrier identifier, and a correspondence between the target identity credential and the active identification carrier identifier.
4. The active identification carrier authentication method of claim 3, wherein before the active identification carrier sends the first request message to the active identification carrier service platform, further comprising:
The active identification carrier sends a first registration request message to the active identification carrier service platform; the first registration request message includes the active identification carrier identification;
the active identification carrier receives a first registration request response message sent by the active identification carrier service platform; the first registration request response message includes a first password.
5. An active identification carrier service platform, comprising:
the receiving module is used for receiving a first request message sent by the active identification carrier; the first request message includes an active identification carrier identification;
the processing module is used for determining a target identity credential according to the active identification carrier identification and the target algorithm received by the receiving module; wherein the target algorithm comprises: the SM2 cryptographic algorithm is used for formulating a corresponding signature certificate for the active identification carrier, and taking the signature certificate as an identity credential of the active identification carrier; the information summarization algorithm is used for formulating corresponding key information for the active identification carrier and taking the key information as an identity credential of the active identification carrier;
The sending module is used for returning a first request response message to the active identification carrier; the first request response message comprises the target identity credential, the active identification carrier identifier and the corresponding relation between the target identity credential and the active identification carrier identifier;
the first request message further comprises a first password, and the active identification carrier service platform comprises a second password; the processing module is further configured to determine that the first password matches the second password.
6. The active identification carrier service platform of claim 5, wherein the receiving module is further configured to receive a first registration request message sent by the active identification carrier; the first registration request message includes the active identification carrier identification;
the sending module is further configured to return a first registration request response message to the active identifier carrier; the first registration request response message is used for indicating that the active identification carrier is registered.
7. An active identification carrier, comprising:
the sending module is used for sending a first request message to the active identification carrier service platform; the first request message comprises an active identification carrier identification; the first request message is used for the active identifier carrier service platform to execute a target operation, and the target operation comprises: determining a target identity credential according to the active identification carrier identification and a target algorithm; wherein the target algorithm comprises: the SM2 cryptographic algorithm is used for formulating a corresponding signature certificate for the active identification carrier, and taking the signature certificate as an identity credential of the active identification carrier; the information summarization algorithm is used for formulating corresponding key information for the active identification carrier and taking the key information as an identity credential of the active identification carrier;
The receiving module is used for receiving a first request response message sent by the active identification carrier service platform; the first request response message includes the target identity credential, the active identification carrier identifier, and a correspondence between the target identity credential and the active identification carrier identifier.
8. The active identification carrier of claim 7, wherein the sending module is further configured to send a first registration request message to the active identification carrier service platform; the first registration request message includes the active identification carrier identification;
the receiving module is further configured to receive a first registration request response message sent by the active identifier carrier service platform; the first registration request response message includes a first password.
9. The active identification carrier service platform is characterized by comprising a memory, a processor, a bus and a communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through the bus; when the active identification carrier service platform runs, the processor executes the computer execution instructions stored in the memory to enable the active identification carrier service platform to execute the active identification carrier authentication method according to any one of claims 1-2.
10. A computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the active identification carrier authentication method according to any of claims 1-2.
11. An active identification carrier is characterized by comprising a memory, a processor, a bus and a communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through the bus; when the active identification carrier is running, the processor executes the computer-executable instructions stored in the memory to cause the active identification carrier to perform the active identification carrier authentication method as claimed in any one of claims 3 to 4.
12. A computer readable storage medium comprising computer executable instructions which, when run on a computer, cause the computer to perform the active identification carrier authentication method according to any of claims 3-4.
CN202110340964.0A 2021-03-30 2021-03-30 Active identification carrier, authentication method thereof and service platform Active CN113098861B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110340964.0A CN113098861B (en) 2021-03-30 2021-03-30 Active identification carrier, authentication method thereof and service platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110340964.0A CN113098861B (en) 2021-03-30 2021-03-30 Active identification carrier, authentication method thereof and service platform

Publications (2)

Publication Number Publication Date
CN113098861A CN113098861A (en) 2021-07-09
CN113098861B true CN113098861B (en) 2023-09-19

Family

ID=76670947

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110340964.0A Active CN113098861B (en) 2021-03-30 2021-03-30 Active identification carrier, authentication method thereof and service platform

Country Status (1)

Country Link
CN (1) CN113098861B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113965930B (en) * 2021-10-15 2022-08-12 南通大学 Quantum key-based industrial internet active identification analysis method and system
CN114268643B (en) * 2021-11-26 2024-04-16 许继集团有限公司 Active identification technology-based power distribution Internet of things terminal and management method
CN115865396B (en) * 2022-09-06 2024-03-01 中国联合网络通信集团有限公司 Carbon emission identification reading method and device, electronic equipment and readable storage medium
CN115412362B (en) * 2022-09-06 2024-05-14 中国联合网络通信集团有限公司 Data acquisition method based on carbon emission, server and terminal
CN116305066B (en) * 2023-05-17 2023-08-22 山东青鸟工业互联网有限公司 Device authentication method, system and storage medium based on active identification carrier

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016145815A1 (en) * 2015-08-14 2016-09-22 中兴通讯股份有限公司 Euicc and activation method thereof, internet of things system, remote subscription management platform
CN111723885A (en) * 2020-06-22 2020-09-29 重庆忽米网络科技有限公司 Industrial internet enterprise identification interaction system and implementation method thereof
CN112200502A (en) * 2020-11-19 2021-01-08 苏州协同创新智能制造装备有限公司 Industrial internet identification analysis method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016145815A1 (en) * 2015-08-14 2016-09-22 中兴通讯股份有限公司 Euicc and activation method thereof, internet of things system, remote subscription management platform
CN111723885A (en) * 2020-06-22 2020-09-29 重庆忽米网络科技有限公司 Industrial internet enterprise identification interaction system and implementation method thereof
CN112200502A (en) * 2020-11-19 2021-01-08 苏州协同创新智能制造装备有限公司 Industrial internet identification analysis method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
工业互联网标识解析—主动标识载体技术白皮书;工业互联网产业联盟;《https://download.csdn.net/download/u013182857/12362214?spm=1003.2122.3001.6634.3》;20200430;第2-4、21-29、62-69页 *
认证视角下的工业互联网标识解析安全;余果等;《信息网络安全》;20200910;全文 *

Also Published As

Publication number Publication date
CN113098861A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN113098861B (en) Active identification carrier, authentication method thereof and service platform
CN108846010B (en) Method, system, computer system and storage medium for tracing product source in network
CN113114624B (en) Identity authentication method and device based on biological characteristics
CN113114796B (en) Active identification carrier, management method thereof and service platform
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
JP6652767B2 (en) Methods for managing the status of connected devices
CN102576397B (en) The checking of token and data integrity protection
AU2019101564A4 (en) Information registration and authentication method and device
WO2018148103A1 (en) Password security
CN113037773B (en) Active identification carrier, management method thereof and service platform
CN113536284B (en) Digital certificate verification method, device, equipment and storage medium
CN112700251B (en) Identity confirmation method, device and system in financial scene
CN103516517A (en) Production method, RFID transponder, authentication method, and reader device
EP4030803A1 (en) Method and system for secure iot device onboarding using a blockchain network
US10200864B2 (en) Method and device for managing wireless access point
CN113301557B (en) eSIM card state management method, device, equipment and storage medium
CN109743237B (en) Authentication method of APP and gateway
CN105790946B (en) Method, system and related equipment for establishing data channel
CN109472124B (en) Method, device, equipment and medium for matching interface use permission
CN113904774A (en) Block chain address authentication method and device and computer equipment
CN114546927B (en) Data transmission method, core, computer readable medium, and electronic device
CN105991566B (en) Method, equipment and system for processing service
CN117176472B (en) Data tamper-proof method, device and system based on intelligent password security equipment
US11930006B2 (en) System and method for hosting FIDO authenticators
CN117911148A (en) Method, device, system and storage medium for determining transaction validity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant