CN114286331B - Identity authentication method and system suitable for electric power Internet of things 5G data terminal - Google Patents

Identity authentication method and system suitable for electric power Internet of things 5G data terminal Download PDF

Info

Publication number
CN114286331B
CN114286331B CN202111468094.1A CN202111468094A CN114286331B CN 114286331 B CN114286331 B CN 114286331B CN 202111468094 A CN202111468094 A CN 202111468094A CN 114286331 B CN114286331 B CN 114286331B
Authority
CN
China
Prior art keywords
attribute
information
data terminal
module
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111468094.1A
Other languages
Chinese (zh)
Other versions
CN114286331A (en
Inventor
潘媚媚
王栋
朱拓夫
方念
韩寅峰
朱健
徐腾飞
孙来文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111468094.1A priority Critical patent/CN114286331B/en
Publication of CN114286331A publication Critical patent/CN114286331A/en
Application granted granted Critical
Publication of CN114286331B publication Critical patent/CN114286331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things, comprising the following steps: s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle; s2, the 5G data terminal sends request information to the management terminal; s3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal; the 5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals which are in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the 5G data terminal comprises a second encryption module and a second decryption module. And establishing network safety connection with the management terminal through identity authentication of the 5G data terminal, and ensuring the safety and confidentiality of data interaction through an encryption and decryption algorithm.

Description

Identity authentication method and system suitable for electric power Internet of things 5G data terminal
Technical Field
The invention relates to the technical field of information security transmission, in particular to an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things.
Background
At present, intelligent mobile terminals widely used in various business systems such as safe production, marketing, emergency command, material management, mobile office and the like of a national power grid company are mainly notebooks and PDAs. The method mainly faces various security threats such as physical security, operating system security, storage security, application security and the like. Once the intelligent mobile terminal accessing the information intranet is invaded, lost or illegally used, a large amount of sensitive data stored on the terminal can be leaked, and huge threat is caused to the security of the information intranet. The traditional access authentication system generally adopts a user name/password mode for authentication, the security intensity of the mode is low, and once an account is stolen, a large amount of sensitive information is completely exposed to illegal access, so that a complete authentication system is required to be designed to ensure the legal security of the identity of the terminal. Meanwhile, due to the complexity of the terminal and the use environment of the terminal, the state of the terminal must be monitored and audited in real time so as to ensure the legal use of the terminal. When the intelligent terminal accesses the intranet to access the service system, a large amount of service data information interaction is performed with the intranet, if malicious invasion and damage events occur in the interaction process, leakage of key information and even wrong service information are possibly caused, so that the safety of the intelligent terminal after the intelligent terminal is accessed needs to be monitored in real time to ensure that the terminal connected with the intranet is safe and legal at all times. The information network safety access of the power system mobile terminal adopts public mobile communication network, which can be divided into GSM/GPRS/EDGE/TD.SCDMA, GSM/GPRS/EDGE/WCDMA, CDMAlx/CDMA2000 and the like according to operators. These public mobile communication networks are physically connected to the Internet outside, and lack high-intensity data encryption protection, and data transmission through public gateway networks faces a serious risk of interception and theft. After the mobile terminal is accessed to the information network of the national power grid company, the mobile terminal needs to interact information with various information systems in the information network, and most of the information belongs to sensitive information and needs to be encrypted and protected with high strength. After the information system is destroyed, the social order and public interests are seriously damaged, or the national security is damaged, and the information system is protected strictly according to the related national management standards and technical standards. Therefore, there is a need to design a method and a system for authenticating a 5G data terminal to ensure the security of information interaction between the 5G data terminal and a management terminal.
Disclosure of Invention
The invention aims to design an identity authentication method and an identity authentication system suitable for a 5G data terminal of an electric power Internet of things, network safety connection with a management terminal is established through identity authentication of the 5G data terminal, a private key is adopted to encrypt request information and then the request information is sent to the management terminal through a network safety channel, the management terminal generates corresponding response information and then sends the response information to the 5G data terminal for decryption, and safety and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain can be ensured.
In order to achieve the technical purpose, the technical scheme provided by the invention is that the identity authentication method suitable for the 5G data terminal of the electric power Internet of things comprises the following steps:
s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle;
s2, the 5G data terminal sends request information to the management terminal;
and S3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal.
Preferably, S1 comprises the steps of:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises all 5G data terminal attribute information in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information through a public channel management terminal, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized.
Preferably, in S13, attribute information corresponding to the 5G data terminal is obtained through the attribute expansion module, and updating the attribute retrieval table includes the following steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit to the attribute management module by the attribute expansion module, adding the newly acquired attribute information and the corresponding binary random code to the attribute expansion bit, and synchronously updating the attribute retrieval table.
Preferably, S2 comprises the steps of:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
Preferably, S3 comprises the steps of:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
The 5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals which are in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the attribute management module is internally provided with an attribute retrieval table, the attribute retrieval table contains all 5G data terminal attribute information in a management domain, and the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
Preferably, the attribute information includes public key information, ID information, and a network connection protocol.
The invention has the beneficial effects that: the invention designs an identity authentication method and an identity authentication system suitable for a 5G data terminal of an electric power Internet of things, which are characterized in that firstly, the identity of the 5G data terminal is authenticated, network security connection with a management terminal is established after authentication is completed, a key is acquired from the management terminal to encrypt request information, the request information is sent to the management terminal to decrypt the request information through a network security channel, and the management terminal generates corresponding response information to encrypt and then sends the response information to the 5G data terminal to decrypt the response information, so that the security and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain can be ensured.
Drawings
Fig. 1 is a flowchart of an identity authentication method suitable for a 5G data terminal of the electric power internet of things.
Fig. 2 is a schematic diagram of a 5G data terminal identity authentication system according to the present invention.
The figure indicates: the system comprises a 1-5G data terminal, a 2-management terminal, a 11-second encryption module, a 12-second decryption module, a 21-attribute management module, a 22-random number distribution module, a 23-first encryption module, a 24-first decryption module, a 25-attribute expansion module and a 26-instruction response module.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and examples, it being understood that the detailed description herein is merely a preferred embodiment of the present invention, which is intended to illustrate the present invention, and not to limit the scope of the invention, as all other embodiments obtained by those skilled in the art without making any inventive effort fall within the scope of the present invention.
Examples:
as shown in fig. 2, a 5G data terminal identity authentication system is composed of a management terminal 2 and a plurality of 5G data terminals 1 communicatively connected with the management terminal; the management terminal comprises an attribute management module 21, a random number distribution module 22, a first encryption module 23, a first decryption module 24, an attribute expansion module 25 and an instruction response module 26; the attribute management module is internally provided with an attribute retrieval table, the attribute retrieval table contains all 5G data terminal attribute information in a management domain, and the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the attribute information comprises public key information, ID information and a network connection protocol; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module 11 and a second decryption module 12; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
As shown in fig. 1, the identity authentication method suitable for the 5G data terminal of the electric power internet of things comprises the following steps:
s1, the management terminal and a plurality of 5G data terminals sequentially establish network connection through an identity mutual recognition principle.
S1 comprises the following substeps:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises all 5G data terminal attribute information in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information through a public channel management terminal, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
the attribute information of the corresponding 5G data terminal is acquired through an attribute expansion module, and the updating of the attribute retrieval table comprises the following sub-steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit from an attribute management module by an attribute expansion module, adding newly acquired attribute information and a corresponding binary random code on the attribute expansion bit, and synchronously updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized.
S2, the 5G data terminal sends request information to the management terminal.
S2 comprises the following substeps:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
And S3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal.
S3 comprises the following substeps:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
The above embodiments are preferred embodiments of the identity authentication method and system for the 5G data terminal of the internet of things, and are not limited to the specific embodiments, but the scope of the invention is not limited to the specific embodiments, and all equivalent changes according to the shape and structure of the invention are within the scope of the invention.

Claims (4)

1. The identity authentication method suitable for the 5G data terminal of the electric power Internet of things is characterized by comprising the following steps of:
s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle;
s2, the 5G data terminal sends request information to the management terminal;
s3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal;
s1 comprises the following steps:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises attribute information of all 5G data terminals in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute storage bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information to the management terminal through a public channel, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
s14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized;
in S13, attribute information corresponding to the 5G data terminal is obtained through the attribute expansion module, and updating the attribute retrieval table includes the following steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit from an attribute management module by an attribute expansion module, adding newly acquired attribute information and a corresponding binary random code on the attribute expansion bit, and synchronously updating an attribute retrieval table;
s2 comprises the following steps:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
2. The identity authentication method suitable for the 5G data terminal of the electric power internet of things according to claim 1, wherein S3 comprises the following steps:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
3. The identity authentication system of the 5G data terminal, which is applicable to the identity authentication method of the 5G data terminal of the electric power internet of things according to any one of claims 1-2, and is characterized by comprising a management terminal and a plurality of 5G data terminals in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the attribute management module is internally provided with an attribute retrieval table, and the attribute retrieval table contains attribute information of all 5G data terminals in a management domain; the random number distribution module distributes binary random codes to the corresponding attribute storage bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
4. A 5G data terminal identity authentication system according to claim 3, wherein the attribute information includes public key information, ID information, and a network connection protocol.
CN202111468094.1A 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal Active CN114286331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111468094.1A CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111468094.1A CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Publications (2)

Publication Number Publication Date
CN114286331A CN114286331A (en) 2022-04-05
CN114286331B true CN114286331B (en) 2023-09-12

Family

ID=80870762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111468094.1A Active CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Country Status (1)

Country Link
CN (1) CN114286331B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117294539B (en) * 2023-11-27 2024-03-19 广东电网有限责任公司东莞供电局 User terminal credible authentication method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013134927A1 (en) * 2012-03-13 2013-09-19 华为终端有限公司 Transport layer security-based key delivery method, smart meter reading terminal and server
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112272095A (en) * 2020-12-24 2021-01-26 飞天诚信科技股份有限公司 Distributed key distribution method and system for real-time communication
CN112565265A (en) * 2020-12-04 2021-03-26 国网辽宁省电力有限公司沈阳供电公司 Authentication method, authentication system and communication method between terminal devices of Internet of things
CN113079506A (en) * 2020-01-03 2021-07-06 中国移动通信集团广东有限公司 Network security authentication method, device and equipment
CN113114460A (en) * 2021-06-15 2021-07-13 国网浙江省电力有限公司杭州供电公司 Quantum encryption-based power distribution network information secure transmission method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487743B (en) * 2015-08-25 2020-02-21 阿里巴巴集团控股有限公司 Method and apparatus for supporting multi-user cluster identity verification

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013134927A1 (en) * 2012-03-13 2013-09-19 华为终端有限公司 Transport layer security-based key delivery method, smart meter reading terminal and server
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN113079506A (en) * 2020-01-03 2021-07-06 中国移动通信集团广东有限公司 Network security authentication method, device and equipment
CN112565265A (en) * 2020-12-04 2021-03-26 国网辽宁省电力有限公司沈阳供电公司 Authentication method, authentication system and communication method between terminal devices of Internet of things
CN112272095A (en) * 2020-12-24 2021-01-26 飞天诚信科技股份有限公司 Distributed key distribution method and system for real-time communication
CN113114460A (en) * 2021-06-15 2021-07-13 国网浙江省电力有限公司杭州供电公司 Quantum encryption-based power distribution network information secure transmission method

Also Published As

Publication number Publication date
CN114286331A (en) 2022-04-05

Similar Documents

Publication Publication Date Title
CN113541935B (en) Encryption cloud storage method, system, equipment and terminal supporting key escrow
CN1926802A (en) Safety data transmission
CN111274599A (en) Data sharing method based on block chain and related device
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN110971593B (en) Database secure network access method
CN111737770A (en) Key management method and application
CN111541690B (en) Safety protection method for communication between intelligent terminal and server
CN114282189A (en) Data security storage method, system, client and server
CN114286331B (en) Identity authentication method and system suitable for electric power Internet of things 5G data terminal
CN102752112A (en) Authority control method and device based on signed message 1 (SM1)/SM2 algorithm
CN110210199B (en) Internet of things equipment identity authentication method based on fingerprint acquisition and identification
CN112968774A (en) Method, device storage medium and equipment for encrypting and decrypting configuration file
CN112787996A (en) Password equipment management method and system
CN116702188A (en) Management and control platform data management method and system
CN116566663A (en) Threat data dynamic processing and efficient sharing method suitable for industrial control system
CN114553557B (en) Key calling method, device, computer equipment and storage medium
CN102098282B (en) Secure encryption method for database
US11550932B2 (en) Method for a terminal to acquire and access data
Kim et al. Secure IoT Device Authentication Scheme using Key Hiding Technology
Shahbazov NAVIGATING THE 5G SECURITY LANDSCAPE: REGULATIONS, TECHNOLOGIES, AND FUTURE CHALLENGES
CN111709027A (en) Data storage safety management method
CN118233218B (en) Remote authentication system and method based on distributed trusted execution environment application
CN114095156B (en) Data protection method for rail transit mobile terminal
Lei et al. Power Grid Data Confirmation Model Based on Behavior Characteristics
CN118101190A (en) Edge gateway multi-level encryption protection method and device based on TPM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant