CN114286331B - Identity authentication method and system suitable for electric power Internet of things 5G data terminal - Google Patents
Identity authentication method and system suitable for electric power Internet of things 5G data terminal Download PDFInfo
- Publication number
- CN114286331B CN114286331B CN202111468094.1A CN202111468094A CN114286331B CN 114286331 B CN114286331 B CN 114286331B CN 202111468094 A CN202111468094 A CN 202111468094A CN 114286331 B CN114286331 B CN 114286331B
- Authority
- CN
- China
- Prior art keywords
- attribute
- information
- data terminal
- module
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things, comprising the following steps: s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle; s2, the 5G data terminal sends request information to the management terminal; s3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal; the 5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals which are in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the 5G data terminal comprises a second encryption module and a second decryption module. And establishing network safety connection with the management terminal through identity authentication of the 5G data terminal, and ensuring the safety and confidentiality of data interaction through an encryption and decryption algorithm.
Description
Technical Field
The invention relates to the technical field of information security transmission, in particular to an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things.
Background
At present, intelligent mobile terminals widely used in various business systems such as safe production, marketing, emergency command, material management, mobile office and the like of a national power grid company are mainly notebooks and PDAs. The method mainly faces various security threats such as physical security, operating system security, storage security, application security and the like. Once the intelligent mobile terminal accessing the information intranet is invaded, lost or illegally used, a large amount of sensitive data stored on the terminal can be leaked, and huge threat is caused to the security of the information intranet. The traditional access authentication system generally adopts a user name/password mode for authentication, the security intensity of the mode is low, and once an account is stolen, a large amount of sensitive information is completely exposed to illegal access, so that a complete authentication system is required to be designed to ensure the legal security of the identity of the terminal. Meanwhile, due to the complexity of the terminal and the use environment of the terminal, the state of the terminal must be monitored and audited in real time so as to ensure the legal use of the terminal. When the intelligent terminal accesses the intranet to access the service system, a large amount of service data information interaction is performed with the intranet, if malicious invasion and damage events occur in the interaction process, leakage of key information and even wrong service information are possibly caused, so that the safety of the intelligent terminal after the intelligent terminal is accessed needs to be monitored in real time to ensure that the terminal connected with the intranet is safe and legal at all times. The information network safety access of the power system mobile terminal adopts public mobile communication network, which can be divided into GSM/GPRS/EDGE/TD.SCDMA, GSM/GPRS/EDGE/WCDMA, CDMAlx/CDMA2000 and the like according to operators. These public mobile communication networks are physically connected to the Internet outside, and lack high-intensity data encryption protection, and data transmission through public gateway networks faces a serious risk of interception and theft. After the mobile terminal is accessed to the information network of the national power grid company, the mobile terminal needs to interact information with various information systems in the information network, and most of the information belongs to sensitive information and needs to be encrypted and protected with high strength. After the information system is destroyed, the social order and public interests are seriously damaged, or the national security is damaged, and the information system is protected strictly according to the related national management standards and technical standards. Therefore, there is a need to design a method and a system for authenticating a 5G data terminal to ensure the security of information interaction between the 5G data terminal and a management terminal.
Disclosure of Invention
The invention aims to design an identity authentication method and an identity authentication system suitable for a 5G data terminal of an electric power Internet of things, network safety connection with a management terminal is established through identity authentication of the 5G data terminal, a private key is adopted to encrypt request information and then the request information is sent to the management terminal through a network safety channel, the management terminal generates corresponding response information and then sends the response information to the 5G data terminal for decryption, and safety and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain can be ensured.
In order to achieve the technical purpose, the technical scheme provided by the invention is that the identity authentication method suitable for the 5G data terminal of the electric power Internet of things comprises the following steps:
s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle;
s2, the 5G data terminal sends request information to the management terminal;
and S3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal.
Preferably, S1 comprises the steps of:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises all 5G data terminal attribute information in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information through a public channel management terminal, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized.
Preferably, in S13, attribute information corresponding to the 5G data terminal is obtained through the attribute expansion module, and updating the attribute retrieval table includes the following steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit to the attribute management module by the attribute expansion module, adding the newly acquired attribute information and the corresponding binary random code to the attribute expansion bit, and synchronously updating the attribute retrieval table.
Preferably, S2 comprises the steps of:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
Preferably, S3 comprises the steps of:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
The 5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals which are in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the attribute management module is internally provided with an attribute retrieval table, the attribute retrieval table contains all 5G data terminal attribute information in a management domain, and the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
Preferably, the attribute information includes public key information, ID information, and a network connection protocol.
The invention has the beneficial effects that: the invention designs an identity authentication method and an identity authentication system suitable for a 5G data terminal of an electric power Internet of things, which are characterized in that firstly, the identity of the 5G data terminal is authenticated, network security connection with a management terminal is established after authentication is completed, a key is acquired from the management terminal to encrypt request information, the request information is sent to the management terminal to decrypt the request information through a network security channel, and the management terminal generates corresponding response information to encrypt and then sends the response information to the 5G data terminal to decrypt the response information, so that the security and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain can be ensured.
Drawings
Fig. 1 is a flowchart of an identity authentication method suitable for a 5G data terminal of the electric power internet of things.
Fig. 2 is a schematic diagram of a 5G data terminal identity authentication system according to the present invention.
The figure indicates: the system comprises a 1-5G data terminal, a 2-management terminal, a 11-second encryption module, a 12-second decryption module, a 21-attribute management module, a 22-random number distribution module, a 23-first encryption module, a 24-first decryption module, a 25-attribute expansion module and a 26-instruction response module.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the present invention will be described in further detail with reference to the accompanying drawings and examples, it being understood that the detailed description herein is merely a preferred embodiment of the present invention, which is intended to illustrate the present invention, and not to limit the scope of the invention, as all other embodiments obtained by those skilled in the art without making any inventive effort fall within the scope of the present invention.
Examples:
as shown in fig. 2, a 5G data terminal identity authentication system is composed of a management terminal 2 and a plurality of 5G data terminals 1 communicatively connected with the management terminal; the management terminal comprises an attribute management module 21, a random number distribution module 22, a first encryption module 23, a first decryption module 24, an attribute expansion module 25 and an instruction response module 26; the attribute management module is internally provided with an attribute retrieval table, the attribute retrieval table contains all 5G data terminal attribute information in a management domain, and the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the attribute information comprises public key information, ID information and a network connection protocol; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module 11 and a second decryption module 12; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
As shown in fig. 1, the identity authentication method suitable for the 5G data terminal of the electric power internet of things comprises the following steps:
s1, the management terminal and a plurality of 5G data terminals sequentially establish network connection through an identity mutual recognition principle.
S1 comprises the following substeps:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises all 5G data terminal attribute information in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information through a public channel management terminal, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
the attribute information of the corresponding 5G data terminal is acquired through an attribute expansion module, and the updating of the attribute retrieval table comprises the following sub-steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit from an attribute management module by an attribute expansion module, adding newly acquired attribute information and a corresponding binary random code on the attribute expansion bit, and synchronously updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized.
S2, the 5G data terminal sends request information to the management terminal.
S2 comprises the following substeps:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
And S3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal.
S3 comprises the following substeps:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
The above embodiments are preferred embodiments of the identity authentication method and system for the 5G data terminal of the internet of things, and are not limited to the specific embodiments, but the scope of the invention is not limited to the specific embodiments, and all equivalent changes according to the shape and structure of the invention are within the scope of the invention.
Claims (4)
1. The identity authentication method suitable for the 5G data terminal of the electric power Internet of things is characterized by comprising the following steps of:
s1, sequentially establishing network connection between a management terminal and a plurality of 5G data terminals through an identity mutual recognition principle;
s2, the 5G data terminal sends request information to the management terminal;
s3, after the management terminal verifies the identity credibility of the 5G data terminal, sending response information to the 5G data terminal;
s1 comprises the following steps:
s11, the management terminal comprises an attribute management module, wherein an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises attribute information of all 5G data terminals in a management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to the corresponding attribute storage bits of the attribute retrieval table;
s12, the 5G data terminal sends network connection request information to the management terminal through a public channel, and the management terminal acquires ID information of the corresponding 5G data terminal;
s13, according to whether corresponding ID information exists in the query attribute retrieval table, if so, a corresponding network connection protocol is called to carry out network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
s14, according to S11-S13, network connection between the management terminal and all the 5G data terminals in the whole management domain is realized;
in S13, attribute information corresponding to the 5G data terminal is obtained through the attribute expansion module, and updating the attribute retrieval table includes the following steps:
s131, when ID information of a corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first key, the binary random code is sent to the corresponding 5G data terminal through a common channel, and the first key is synchronously stored in the first decryption module;
s132, a corresponding 5G data terminal acquires a first key, and a second encryption module in the 5G data terminal encrypts attribute information of the first key and sends the encrypted attribute information to a management terminal through a common channel;
s133, a first decryption module in the management terminal decrypts the attribute information and stores the attribute information into an attribute expansion module;
s133, applying an attribute expansion bit from an attribute management module by an attribute expansion module, adding newly acquired attribute information and a corresponding binary random code on the attribute expansion bit, and synchronously updating an attribute retrieval table;
s2 comprises the following steps:
s21, after establishing network security communication between the 5G data terminal and the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the 5G data terminal and sends the pseudo request information to the management terminal;
s22, the management terminal verifies the pseudo request information after obtaining the pseudo request information, and after verification is successful, an attribute storage bit corresponding to the 5G data terminal is obtained, and a binary random code on the attribute storage bit is sent to the corresponding 5G data terminal;
s23, the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs the request information block through a private key of the request information block, and sends the request information block to the management terminal.
2. The identity authentication method suitable for the 5G data terminal of the electric power internet of things according to claim 1, wherein S3 comprises the following steps:
s31, the management terminal performs signature authentication on the acquired request information block, finds out a corresponding attribute storage bit, and the decryption module invokes a binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through the public key of the corresponding 5G data terminal and sends the response information to the corresponding 5G data terminal;
s33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal, and executes the related instruction.
3. The identity authentication system of the 5G data terminal, which is applicable to the identity authentication method of the 5G data terminal of the electric power internet of things according to any one of claims 1-2, and is characterized by comprising a management terminal and a plurality of 5G data terminals in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the attribute management module is internally provided with an attribute retrieval table, and the attribute retrieval table contains attribute information of all 5G data terminals in a management domain; the random number distribution module distributes binary random codes to the corresponding attribute storage bits of the attribute retrieval table; the binary random code is used as a first key to be distributed to the 5G data terminal for encrypting attribute information of the binary random code; the first encryption module is used for encrypting the first key by adopting the public key of the corresponding 5G data terminal and then sending the first key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information by adopting the first key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting the private key of the second decryption module.
4. A 5G data terminal identity authentication system according to claim 3, wherein the attribute information includes public key information, ID information, and a network connection protocol.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111468094.1A CN114286331B (en) | 2021-12-03 | 2021-12-03 | Identity authentication method and system suitable for electric power Internet of things 5G data terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111468094.1A CN114286331B (en) | 2021-12-03 | 2021-12-03 | Identity authentication method and system suitable for electric power Internet of things 5G data terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114286331A CN114286331A (en) | 2022-04-05 |
CN114286331B true CN114286331B (en) | 2023-09-12 |
Family
ID=80870762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111468094.1A Active CN114286331B (en) | 2021-12-03 | 2021-12-03 | Identity authentication method and system suitable for electric power Internet of things 5G data terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114286331B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117294539B (en) * | 2023-11-27 | 2024-03-19 | 广东电网有限责任公司东莞供电局 | User terminal credible authentication method, device, equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013134927A1 (en) * | 2012-03-13 | 2013-09-19 | 华为终端有限公司 | Transport layer security-based key delivery method, smart meter reading terminal and server |
CN111372247A (en) * | 2019-12-23 | 2020-07-03 | 国网天津市电力公司 | Terminal secure access method and terminal secure access system based on narrowband Internet of things |
CN112272095A (en) * | 2020-12-24 | 2021-01-26 | 飞天诚信科技股份有限公司 | Distributed key distribution method and system for real-time communication |
CN112565265A (en) * | 2020-12-04 | 2021-03-26 | 国网辽宁省电力有限公司沈阳供电公司 | Authentication method, authentication system and communication method between terminal devices of Internet of things |
CN113079506A (en) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | Network security authentication method, device and equipment |
CN113114460A (en) * | 2021-06-15 | 2021-07-13 | 国网浙江省电力有限公司杭州供电公司 | Quantum encryption-based power distribution network information secure transmission method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106487743B (en) * | 2015-08-25 | 2020-02-21 | 阿里巴巴集团控股有限公司 | Method and apparatus for supporting multi-user cluster identity verification |
-
2021
- 2021-12-03 CN CN202111468094.1A patent/CN114286331B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013134927A1 (en) * | 2012-03-13 | 2013-09-19 | 华为终端有限公司 | Transport layer security-based key delivery method, smart meter reading terminal and server |
CN111372247A (en) * | 2019-12-23 | 2020-07-03 | 国网天津市电力公司 | Terminal secure access method and terminal secure access system based on narrowband Internet of things |
CN113079506A (en) * | 2020-01-03 | 2021-07-06 | 中国移动通信集团广东有限公司 | Network security authentication method, device and equipment |
CN112565265A (en) * | 2020-12-04 | 2021-03-26 | 国网辽宁省电力有限公司沈阳供电公司 | Authentication method, authentication system and communication method between terminal devices of Internet of things |
CN112272095A (en) * | 2020-12-24 | 2021-01-26 | 飞天诚信科技股份有限公司 | Distributed key distribution method and system for real-time communication |
CN113114460A (en) * | 2021-06-15 | 2021-07-13 | 国网浙江省电力有限公司杭州供电公司 | Quantum encryption-based power distribution network information secure transmission method |
Also Published As
Publication number | Publication date |
---|---|
CN114286331A (en) | 2022-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113541935B (en) | Encryption cloud storage method, system, equipment and terminal supporting key escrow | |
CN1926802A (en) | Safety data transmission | |
CN111274599A (en) | Data sharing method based on block chain and related device | |
CN110225014B (en) | Internet of things equipment identity authentication method based on fingerprint centralized issuing mode | |
CN110971593B (en) | Database secure network access method | |
CN111737770A (en) | Key management method and application | |
CN111541690B (en) | Safety protection method for communication between intelligent terminal and server | |
CN114282189A (en) | Data security storage method, system, client and server | |
CN114286331B (en) | Identity authentication method and system suitable for electric power Internet of things 5G data terminal | |
CN102752112A (en) | Authority control method and device based on signed message 1 (SM1)/SM2 algorithm | |
CN110210199B (en) | Internet of things equipment identity authentication method based on fingerprint acquisition and identification | |
CN112968774A (en) | Method, device storage medium and equipment for encrypting and decrypting configuration file | |
CN112787996A (en) | Password equipment management method and system | |
CN116702188A (en) | Management and control platform data management method and system | |
CN116566663A (en) | Threat data dynamic processing and efficient sharing method suitable for industrial control system | |
CN114553557B (en) | Key calling method, device, computer equipment and storage medium | |
CN102098282B (en) | Secure encryption method for database | |
US11550932B2 (en) | Method for a terminal to acquire and access data | |
Kim et al. | Secure IoT Device Authentication Scheme using Key Hiding Technology | |
Shahbazov | NAVIGATING THE 5G SECURITY LANDSCAPE: REGULATIONS, TECHNOLOGIES, AND FUTURE CHALLENGES | |
CN111709027A (en) | Data storage safety management method | |
CN118233218B (en) | Remote authentication system and method based on distributed trusted execution environment application | |
CN114095156B (en) | Data protection method for rail transit mobile terminal | |
Lei et al. | Power Grid Data Confirmation Model Based on Behavior Characteristics | |
CN118101190A (en) | Edge gateway multi-level encryption protection method and device based on TPM |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |