CN113612744B - Remote authorization system and method - Google Patents

Remote authorization system and method Download PDF

Info

Publication number
CN113612744B
CN113612744B CN202110837580.XA CN202110837580A CN113612744B CN 113612744 B CN113612744 B CN 113612744B CN 202110837580 A CN202110837580 A CN 202110837580A CN 113612744 B CN113612744 B CN 113612744B
Authority
CN
China
Prior art keywords
ciphertext
authorization
client
controlled terminal
authorization request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110837580.XA
Other languages
Chinese (zh)
Other versions
CN113612744A (en
Inventor
陈桂刚
宋晨
田松
赵岩
刘焕彬
张振琪
李文泽
郭翔
李瑞祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Zhongxin Zhiguan Information Technology Co ltd
Original Assignee
Tianjin Zhongxin Zhiguan Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin Zhongxin Zhiguan Information Technology Co ltd filed Critical Tianjin Zhongxin Zhiguan Information Technology Co ltd
Priority to CN202110837580.XA priority Critical patent/CN113612744B/en
Publication of CN113612744A publication Critical patent/CN113612744A/en
Application granted granted Critical
Publication of CN113612744B publication Critical patent/CN113612744B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/043Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
    • H04W12/0431Key distribution or pre-distribution; Key agreement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The embodiment of the invention discloses a remote authorization system and a method, wherein the remote authorization system comprises a client, a server and a controlled terminal, wherein: the client sends an authorization request for controlling the controlled terminal to the server; the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client; the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal; the controlled terminal receives the first ciphertext and the authorization request, and determines whether the authorization is successful or not based on the first ciphertext and the authorization request.

Description

Remote authorization system and method
Technical Field
The embodiment of the invention relates to the technical field of remote authorization, in particular to a remote authorization system and a method.
Background
The existing remote authorization method generally needs to be composed of a control center server, a client and a controlled terminal, and when the client wants to control the controlled terminal to execute a certain instruction, the client generally needs to authorize the server.
In the existing remote authorization method, a client sends an authorization request to a server, the server receives the authorization request and then determines whether the client is legal, if so, the authorization client controls a controlled terminal and simultaneously sends information of the authorized client to the controlled terminal.
Disclosure of Invention
The invention provides a remote authorization system and a remote authorization method, which can improve the security in the authorization process and relieve the pressure of a server.
In one aspect, an embodiment of the present invention provides a remote authorization system, where the system includes a client, a server, and a controlled terminal, where:
the client sends an authorization request for controlling the controlled terminal to the server;
the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client;
the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal;
and the controlled terminal receives the first ciphertext and the authorization request and determines whether the authorization is successful or not based on the first ciphertext and the authorization request.
On the other hand, the embodiment of the invention also provides a remote authorization method, which is executed by the remote authorization system according to any one of the embodiments of the invention, and comprises the following steps:
the client sends an authorization request for controlling the controlled terminal to the server;
the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client;
the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal;
and the controlled terminal receives the first ciphertext and the authorization request and determines whether the authorization is successful or not based on the first ciphertext and the authorization request.
The technical scheme of the embodiment of the invention provides a remote authorization system, which comprises a client, a server and a controlled terminal, wherein: the client sends an authorization request for controlling the controlled terminal to the server; the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client; the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal; the controlled terminal receives the first ciphertext and the authorization request, determines whether the authorization is successful based on the first ciphertext and the authorization request, obtains the ciphertext of the authorization request by performing irreversible encryption operation on the authorization request of the client by utilizing a server in the remote authorization system, and simultaneously checks the ciphertext to determine whether the authorization is authorized at the side of the controlled terminal, so that the security in the authorization process can be improved, and the pressure at the side of the server can be relieved.
Drawings
In order to more clearly illustrate the technical solution of the exemplary embodiments of the present invention, a brief description is given below of the drawings required for describing the embodiments. It is obvious that the drawings presented are only drawings of some of the embodiments of the invention to be described, and not all the drawings, and that other drawings can be made according to these drawings without inventive effort for a person skilled in the art.
FIG. 1A is a schematic diagram of a remote authorization system according to a first embodiment of the present invention;
FIG. 1B is a schematic diagram of an interaction flow of a remote authorization system according to a first embodiment of the present invention;
fig. 2 is a flow chart of a remote authorization method in a second embodiment of the invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present invention are shown in the drawings.
Example 1
Fig. 1A is a schematic structural diagram of a remote authorization system according to an embodiment of the present invention, as shown in fig. 1A, where the remote authorization system includes a server 110, a client 120, and a controlled terminal 130, and the method includes:
the client 120 transmits an authorization request for controlling the controlled terminal 130 to the server 110;
the server 110 receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client 120;
the client 120 receives the first ciphertext and sends the first ciphertext and the authorization request to the controlled terminal 130;
the controlled terminal 130 receives the first ciphertext and the authorization request, and determines whether authorization is successful based on the first ciphertext and the authorization request.
Wherein, the client 120 may be a mobile client, and the client 120 may be a mobile phone, an ipad, a notebook computer, or the like. The controlled terminal 130 may preferably be various execution devices in a production plant, and the controlled terminal 130 may be an isolating switch for controlling the start and stop of the devices, for example.
In this embodiment, the authorization request may be preferably a request sent by the client 120 to the server 110 for applying the control authority of the controlled terminal 130. The authorization request may include a client ID, a controlled terminal ID, and an authorization request timestamp, where the client ID and the controlled terminal ID are unique identifiers of the respective client 120 and the controlled terminal 130, and the authorization request timestamp may be preferably a time when the authorization request is generated or a time when the authorization request is sent, and may uniquely identify the corresponding authorization request. It will be appreciated that the authorization request, once generated, may be stored in a cache of the client 120 for subsequent use.
Preferably, the server 110 may perform irreversible encryption on the received authorization request by adopting an irreversible encryption algorithm, where the irreversible encryption algorithm is characterized in that a key is not required to be used in the encryption process, and the server 110 directly uses the encryption algorithm to process the received authorization request into ciphertext. The irreversible encryption Algorithm may be, for example, an MD5 (Message-Digest algoritm 5) encryption Algorithm.
After receiving the first ciphertext and the authorization request, the controlled terminal 130 may preferably determine whether the first ciphertext is valid by using the authorization request, and further determine whether the authorization is successful according to the validity of the first ciphertext. If the authorization is determined to be successful, the client 120 may send a control instruction to the controlled terminal 130, and the controlled terminal 130 may perform a corresponding operation according to the control instruction. It may be appreciated that the client 120 may send the first ciphertext and the authorization request to the controlled terminal 130, and at the same time, send the control instruction to the controlled terminal 130, and after determining that the authorization is successful, the controlled terminal 130 may directly perform a corresponding operation according to the control instruction.
Taking a client as a mobile phone and a controlled terminal as an example of an isolating switch in a production workshop, the steps are specifically described as follows: the mobile phone sends an authorization request for controlling the isolating switch to the server, the authorization request comprises information such as a mobile phone ID, an isolating switch ID, authorization request generation time and the like, the server receives the authorization request sent by the mobile phone, encrypts the authorization request by utilizing an irreversible encryption algorithm MD5 to obtain a first ciphertext, sends the first ciphertext to the mobile phone, after receiving the first ciphertext, the mobile phone sends the first ciphertext and the authorization request in the buffer memory to the isolating switch, and after receiving the first ciphertext and the authorization request, the isolating switch determines whether the first ciphertext is valid or not based on the first ciphertext and the authorization request, and further determines whether the authorization is successful or not.
The technical scheme of the embodiment of the invention provides a remote authorization system, which comprises a client, a server and a controlled terminal, wherein: the client sends an authorization request for controlling the controlled terminal to the server; the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client; the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal; the controlled terminal receives the first ciphertext and the authorization request, determines whether the authorization is successful based on the first ciphertext and the authorization request, and obtains the ciphertext of the authorization request by performing irreversible encryption operation on the authorization request of the client by utilizing a server in the remote authorization system.
On the basis of the above embodiments, further, the controlled terminal is further configured to perform the irreversible encryption on the authorization request after receiving the first ciphertext and the authorization request, to obtain a second ciphertext;
verifying whether the first ciphertext and the second ciphertext are consistent;
if the authorization is consistent, the authorization is successful;
if not, the authorization fails.
In this embodiment, after the controlled terminal receives the first ciphertext and the authorization request, the controlled terminal performs irreversible encryption on the authorization request by using the same irreversible encryption algorithm as the server to obtain a second ciphertext, verifies whether the first ciphertext and the second ciphertext are consistent, if so, can determine that the authorization is successful, and if not, can determine that the authorization is failed. According to the technical scheme, the authorization request is subjected to irreversible encryption again at the controlled terminal side to obtain the second ciphertext, whether the second ciphertext is consistent with the first ciphertext is verified to determine whether the authorization is successful or not, and compared with the existing mode of carrying out symmetric encryption and then decryption, the method is difficult to make mistakes in the authorization process and higher in safety.
On the basis of the above embodiments, further, the controlled terminal is further configured to compare the first ciphertext with cached ciphertext information after determining that the authorization is successful, and determine whether the first ciphertext is coincident with the cached ciphertext information;
if the coincidence exists, the authorization fails;
if no coincidence exists, the authorization is successful.
In the practical use process of the embodiments, once the client is authorized, the controlled terminal can be controlled for multiple times, and the process has potential safety hazards. In order to solve the above problem, in this embodiment, preferably, a ciphertext buffering device may be set in the controlled terminal, and the ciphertext information received in the preset period of time is buffered in the controlled terminal, when it is determined that the first ciphertext is consistent with the second ciphertext, the first ciphertext may be further compared with the buffered ciphertext information, if the first ciphertext is coincident with the buffered ciphertext information, that is, the buffered ciphertext information includes the first ciphertext, it is indicated that the client that sends the first ciphertext has performed the authorization operation before the present time, so that the authorization fails, and if the first ciphertext is not coincident with the buffered ciphertext information, that is, the buffered ciphertext information does not include the first ciphertext, it is indicated that the client that sends the first ciphertext has not performed the authorization operation before the present time, so that the authorization succeeds, and the above operation may achieve the effect of one-time authorization.
On the basis of the above embodiments, further, the client and the controlled terminal are both provided with a bluetooth connection device, and the client establishes bluetooth communication connection with the controlled terminal through the bluetooth connection device after receiving the first ciphertext.
Today, networks are increasingly developed but still do not cover all corners, in many areas, especially production workshops, the networks are not easy to intervene, signals are also greatly shielded, so that in the case of a bad network environment, an authorized terminal cannot directly connect a client and a server, and authorization information cannot be synchronized.
In this embodiment, bluetooth connection devices may be preferably set in the client and the controlled terminal, where the client and the controlled terminal establish communication connection through the bluetooth connection devices. In the actual use process, the client can be moved to the Bluetooth connection range of the controlled terminal, so that Bluetooth communication connection between the client and the mobile terminal is established.
On the basis of the above embodiments, further, the controlled terminal is further configured to send a public key to the client after establishing a bluetooth communication connection with the client;
the client receives the public key, encrypts the first ciphertext by utilizing the public key, generates a third ciphertext, and sends the third ciphertext to the controlled terminal;
and the controlled terminal receives the third ciphertext and decrypts the third ciphertext by using a private key to obtain the first ciphertext.
In order to further ensure the security and effectiveness of the authorization process, it is preferable that the first ciphertext is encrypted for the second time based on the primary encryption performed by the server. Specifically, the client may perform asymmetric encryption on the first ciphertext by using the public key sent by the controlled terminal, generate a third ciphertext, send the third ciphertext to the controlled terminal, and decrypt the third ciphertext by using the corresponding private key by the controlled terminal to obtain the first ciphertext. The client performs asymmetric confidentiality on the first ciphertext by adopting an asymmetric encryption algorithm, wherein the asymmetric encryption algorithm needs two keys, namely a public key (public key) and a private key (private key), and the public key and the private key are a pair, and if the public key is used for encrypting the data, the data can be decrypted only by using the corresponding private key. The asymmetric encryption algorithm may be an RSA encryption algorithm, for example.
Fig. 1B is a schematic diagram of an interaction flow of a remote authorization system according to a first embodiment of the present invention, and as shown in fig. 1B, a complete example is used to specifically describe the remote authorization system and the remote authorization interaction flow described above: still take the customer end as the cell-phone, the isolator in the production shop of controlled terminal as the example, and all be provided with bluetooth connecting device in cell-phone and the isolator. The mobile phone sends an authorization request for controlling the isolating switch to the server, wherein the authorization request comprises information such as a mobile phone ID, the isolating switch ID, authorization request generation time and the like, the server receives the authorization request sent by the mobile phone, encrypts the authorization request by utilizing an irreversible encryption algorithm MD5 to obtain a first ciphertext, and sends the first ciphertext to the mobile phone.
After the mobile phone receives the first ciphertext, the mobile phone moves to the vicinity of the authorization terminal and establishes Bluetooth communication connection with the authorization terminal, the mobile phone receives a public key sent by the authorization terminal, the public key is used for carrying out asymmetric encryption on the first ciphertext and the control instruction to obtain a third ciphertext, and the mobile phone sends the third ciphertext and an authorization request in a buffer memory to the isolating switch.
After the isolating switch receives the third ciphertext and the authorization request, the third ciphertext is decrypted by using the private key to obtain a first ciphertext and a control instruction, wherein the control instruction is an instruction for controlling the isolating switch to be opened. The disconnecting switch encrypts the authorization request again by utilizing an irreversible encryption algorithm MD5 to obtain a second ciphertext, compares the first ciphertext with the second ciphertext to determine that the first ciphertext is consistent with the second ciphertext, further compares the first ciphertext with the cached ciphertext information of the first ciphertext to determine that the first ciphertext does not overlap with the cached ciphertext information, and determines that the authorization is successful at the moment, and the disconnecting switch executes corresponding opening operation.
Example two
Fig. 2 is a flow chart of a remote authorization method provided in a second embodiment of the present invention, where the embodiment is applicable to a situation where authorization rights for controlling a controlled terminal need to be obtained from a server and the controlled terminal is controlled. The remote authorization system provided by the embodiment of the invention is used for executing. As shown in fig. 2, the method specifically includes the following steps:
s210, the client sends an authorization request for controlling the controlled terminal to the server;
s220, the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client;
s230, the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal;
s240, the controlled terminal receives the first ciphertext and the authorization request, and determines whether the authorization is successful or not based on the first ciphertext and the authorization request.
The technical scheme of the embodiment of the invention provides a remote authorization method which is executed by a remote authorization system comprising a client, a server and a controlled terminal, wherein the method utilizes the client to send an authorization request for controlling the controlled terminal to the server; the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client; the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal; the controlled terminal receives the first ciphertext and the authorization request, determines whether the authorization is successful based on the first ciphertext and the authorization request, obtains the ciphertext of the authorization request by performing irreversible encryption operation on the authorization request of the client by using the server, and simultaneously adopts the ciphertext to check at the side of the controlled terminal to determine whether the authorization is authorized, thereby improving the security in the authorization process and relieving the pressure at the side of the server.
On the basis of the above embodiments, further, the controlled terminal receives the first ciphertext and the authorization request, and determines whether authorization is successful based on the first ciphertext and the authorization request, including:
the controlled terminal performs the irreversible encryption on the authorization request to obtain a second ciphertext;
verifying whether the first ciphertext and the second ciphertext are consistent;
if the authorization is consistent, the authorization is successful;
if not, the authorization fails.
On the basis of the above embodiments, further, verifying whether the first ciphertext and the second ciphertext are consistent; if the authorization is consistent, after the authorization is successful, the method further comprises the following steps:
the controlled terminal compares the first ciphertext with the cached ciphertext information and judges whether the first ciphertext is overlapped with the cached ciphertext information or not;
if the coincidence exists, the authorization fails;
if no coincidence exists, the authorization is successful.
On the basis of the above embodiments, further, after the client receives the first ciphertext, the method further includes the client establishing bluetooth communication connection with the controlled terminal through a bluetooth connection device.
On the basis of the above embodiments, further, after the client establishes bluetooth communication connection with the controlled terminal through the bluetooth connection device, the method further includes the controlled terminal sending a public key to the client;
the client receives the public key, encrypts the first ciphertext by utilizing the public key, generates a third ciphertext, and sends the third ciphertext to the controlled terminal;
and the controlled terminal receives the third ciphertext and decrypts the third ciphertext by using a private key to obtain the first ciphertext.
Further, on the basis of the above embodiments, the authorization request includes a client ID, a controlled terminal ID, and an authorization request timestamp.
On the basis of the foregoing embodiments, further, before the server irreversibly encrypts the authorization request, the method further includes:
the server determines whether the client ID is a legal ID;
and if the client ID is legal ID, carrying out irreversible encryption on the authorization request.
In order to improve the security of the authorization process, it is preferable that, in addition to the method of the foregoing embodiments, an authorized client ID be set in advance in the server, and other clients, except for the preset client ID, will not respond to the corresponding authorization request even if they send the authorization request, and the server will only make an encrypted response if the server determines that the client ID in the authorization request is the preset client ID.
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.

Claims (9)

1. The remote authorization system is characterized by comprising a client, a server and a controlled terminal, wherein the client and the controlled terminal are in communication connection through a Bluetooth connection device, and direct communication is not performed between the authorized terminal and the server, wherein:
the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client;
the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal;
the controlled terminal receives the first ciphertext and the authorization request, and determines whether the authorization is successful or not based on the first ciphertext and the authorization request;
the controlled terminal is further used for comparing the first ciphertext with the cached ciphertext information after determining that the authorization is successful, and judging whether the first ciphertext is coincident with the cached ciphertext information or not;
if the coincidence exists, the authorization fails;
if no coincidence exists, the authorization is successful.
2. The system of claim 1, wherein the controlled terminal is further configured to, after receiving the first ciphertext and the authorization request, perform the irreversible encryption on the authorization request to obtain a second ciphertext;
verifying whether the first ciphertext and the second ciphertext are consistent;
if the authorization is consistent, the authorization is successful;
if not, the authorization fails.
3. The system according to any of claims 1-2, wherein the client and the controlled terminal are each provided with bluetooth connection means, and wherein the client establishes a bluetooth communication connection with the controlled terminal via the bluetooth connection means after receiving the first ciphertext.
4. A system according to claim 3, wherein the controlled terminal is further configured to send a public key to the client after establishing a bluetooth communication connection with the client;
the client receives the public key, encrypts the first ciphertext by utilizing the public key, generates a third ciphertext, and sends the third ciphertext to the controlled terminal;
and the controlled terminal receives the third ciphertext and decrypts the third ciphertext by using a private key to obtain the first ciphertext.
5. A remote authorization method performed by the remote authorization system of any one of claims 1-4, comprising:
the client sends an authorization request for controlling the controlled terminal to the server;
the server receives the authorization request, irreversibly encrypts the authorization request, generates a first ciphertext, and sends the first ciphertext to the client;
the client receives the first ciphertext and sends the first ciphertext and the authorization request to a controlled terminal;
and the controlled terminal receives the first ciphertext and the authorization request and determines whether the authorization is successful or not based on the first ciphertext and the authorization request.
6. The method of claim 5, wherein the controlled terminal receiving the first ciphertext and the authorization request and determining whether authorization was successful based on the first ciphertext and the authorization request comprises:
the controlled terminal performs the irreversible encryption on the authorization request to obtain a second ciphertext;
verifying whether the first ciphertext and the second ciphertext are consistent;
if the authorization is consistent, the authorization is successful;
if not, the authorization fails.
7. The method according to claim 5 or 6, wherein the client sends the first ciphertext to a controlled terminal, comprising:
the controlled terminal sends a public key to the client;
the client receives the public key, encrypts the first ciphertext by utilizing the public key, generates a third ciphertext, and sends the third ciphertext to the controlled terminal;
and the controlled terminal receives the third ciphertext and decrypts the third ciphertext by using a private key to obtain the first ciphertext.
8. The method according to claim 5 or 6, wherein the authorization request comprises a client ID, a controlled terminal ID and an authorization request timestamp.
9. The method of claim 8, further comprising, prior to the server irreversibly encrypting the authorization request:
the server determines whether the client ID is a legal ID;
and if the client ID is legal ID, carrying out irreversible encryption on the authorization request.
CN202110837580.XA 2021-07-23 2021-07-23 Remote authorization system and method Active CN113612744B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110837580.XA CN113612744B (en) 2021-07-23 2021-07-23 Remote authorization system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110837580.XA CN113612744B (en) 2021-07-23 2021-07-23 Remote authorization system and method

Publications (2)

Publication Number Publication Date
CN113612744A CN113612744A (en) 2021-11-05
CN113612744B true CN113612744B (en) 2023-09-22

Family

ID=78338199

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110837580.XA Active CN113612744B (en) 2021-07-23 2021-07-23 Remote authorization system and method

Country Status (1)

Country Link
CN (1) CN113612744B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841109A (en) * 2014-03-13 2014-06-04 北京屏联科技有限公司 Room smart control method, device and system
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN107918731A (en) * 2016-10-11 2018-04-17 百度在线网络技术(北京)有限公司 Method and apparatus for controlling the authority to access to open interface
CN108370319A (en) * 2015-12-04 2018-08-03 维萨国际服务协会 unique code for token authentication
CN109428891A (en) * 2017-08-31 2019-03-05 佳能株式会社 Permission transfer system and its control method and client
CN109510710A (en) * 2018-12-20 2019-03-22 平安科技(深圳)有限公司 A kind of response method and system of service request
CN110225054A (en) * 2019-06-20 2019-09-10 腾讯科技(深圳)有限公司 Remote assistance connects method for building up, device, server and storage medium
CN110473327A (en) * 2019-09-05 2019-11-19 广东纬德信息科技有限公司 A kind of lock control method based on NFC, system and storage medium
CN111783060A (en) * 2020-06-04 2020-10-16 北京海泰方圆科技股份有限公司 Electronic certificate distribution control method and device, electronic equipment and storage medium
CN112699342A (en) * 2021-03-24 2021-04-23 统信软件技术有限公司 Authorization control method, authorization device and computing equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103841109A (en) * 2014-03-13 2014-06-04 北京屏联科技有限公司 Room smart control method, device and system
CN103973695A (en) * 2014-05-16 2014-08-06 浪潮电子信息产业股份有限公司 Signature algorithm for server validation
CN108370319A (en) * 2015-12-04 2018-08-03 维萨国际服务协会 unique code for token authentication
CN106056713A (en) * 2016-06-08 2016-10-26 珠海明居智能科技有限公司 Remote authorization method for combination locks
CN107918731A (en) * 2016-10-11 2018-04-17 百度在线网络技术(北京)有限公司 Method and apparatus for controlling the authority to access to open interface
CN109428891A (en) * 2017-08-31 2019-03-05 佳能株式会社 Permission transfer system and its control method and client
CN109510710A (en) * 2018-12-20 2019-03-22 平安科技(深圳)有限公司 A kind of response method and system of service request
CN110225054A (en) * 2019-06-20 2019-09-10 腾讯科技(深圳)有限公司 Remote assistance connects method for building up, device, server and storage medium
CN110473327A (en) * 2019-09-05 2019-11-19 广东纬德信息科技有限公司 A kind of lock control method based on NFC, system and storage medium
CN111783060A (en) * 2020-06-04 2020-10-16 北京海泰方圆科技股份有限公司 Electronic certificate distribution control method and device, electronic equipment and storage medium
CN112699342A (en) * 2021-03-24 2021-04-23 统信软件技术有限公司 Authorization control method, authorization device and computing equipment

Also Published As

Publication number Publication date
CN113612744A (en) 2021-11-05

Similar Documents

Publication Publication Date Title
CN109347835B (en) Information transmission method, client, server, and computer-readable storage medium
CN110380852B (en) Bidirectional authentication method and communication system
EP3723399A1 (en) Identity verification method and apparatus
US10554420B2 (en) Wireless connections to a wireless access point
CN108134789B (en) Method for synchronizing data between devices through cloud and cloud server
CN110621014B (en) Vehicle-mounted equipment, program upgrading method thereof and server
CN106850207B (en) Identity identifying method and system without CA
KR20040075293A (en) Apparatus and method simplifying an encrypted network
CN113781678B (en) Vehicle Bluetooth key generation and authentication method and system in networking-free environment
CN110690956B (en) Bidirectional authentication method and system, server and terminal
WO2017084553A1 (en) Method and apparatus for performing authorization between devices
CN110677382A (en) Data security processing method, device, computer system and storage medium
CN113794734A (en) Vehicle-mounted CAN bus encryption communication method, control device and readable storage medium
CN104243452B (en) A kind of cloud computing access control method and system
CN110838919B (en) Communication method, storage method, operation method and device
CN111654503A (en) Remote control method, device, equipment and storage medium
JP6378424B1 (en) User authentication method with enhanced integrity and security
CN108667800A (en) A kind of authentication method and device of access rights
CN110912857B (en) Method and storage medium for sharing login between mobile applications
CN113612744B (en) Remote authorization system and method
CN108900595B (en) Method, device and equipment for accessing data of cloud storage server and computing medium
KR102288444B1 (en) Firmware updating method, apparatus and program of authentication module
CN114065170A (en) Method and device for acquiring platform identity certificate and server
CN107682380B (en) Cross authentication method and device
CN110365661B (en) Network security authentication method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant