CN114666074B - Product identification authentication method and device - Google Patents
Product identification authentication method and device Download PDFInfo
- Publication number
- CN114666074B CN114666074B CN202011410139.5A CN202011410139A CN114666074B CN 114666074 B CN114666074 B CN 114666074B CN 202011410139 A CN202011410139 A CN 202011410139A CN 114666074 B CN114666074 B CN 114666074B
- Authority
- CN
- China
- Prior art keywords
- identification
- authentication
- identifier
- product
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000004458 analytical method Methods 0.000 claims abstract description 139
- 238000004364 calculation method Methods 0.000 claims abstract description 84
- 238000004891 communication Methods 0.000 claims description 15
- 238000005516 engineering process Methods 0.000 claims description 11
- 230000002093 peripheral effect Effects 0.000 claims description 11
- 230000001360 synchronised effect Effects 0.000 claims description 11
- 230000004913 activation Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 8
- 230000003993 interaction Effects 0.000 abstract description 23
- 238000007726 management method Methods 0.000 abstract description 13
- 238000012423 maintenance Methods 0.000 abstract description 9
- 238000004519 manufacturing process Methods 0.000 description 22
- 238000010586 diagram Methods 0.000 description 8
- 238000012795 verification Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 3
- 238000009434 installation Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 1
- 231100000279 safety data Toxicity 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0884—Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Power Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a product identification authentication method and device, wherein the method comprises the following steps: reading a target identifier of a target product stored in a security chip and an identifier key corresponding to the target identifier; performing authentication calculation on the target identifier by adopting an identifier key to obtain a first authentication calculation result; generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result; sending the first identification analysis authentication request message to an identifiable identification analysis platform; and receiving a first identification authentication result fed back by the trusted identification analysis platform, wherein the first identification authentication result carries identification information corresponding to the target identification. In the invention, a product is supported to write a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of an identifiable identification analysis platform, so that safe data interaction is performed, and online maintenance and management of information in the whole life cycle of the product are realized.
Description
Technical Field
The embodiment of the invention relates to the field of security authentication of the Internet of things, in particular to a product identification authentication method and device.
Background
In order to enable people and machines to be interconnected more conveniently and efficiently, tracing of important products and full life cycle management of intelligent products are achieved. At present, two major types of tracing identification authentication modes exist for products, namely, external identification such as bar codes, two-dimensional codes, RFID (Radio Frequency Identification ) electronic tags and the like are installed, wherein the RFID (Radio Frequency Identification ) electronic tags require a terminal to be embedded with a radio frequency module to read identification authentication, and the bar codes or the two-dimensional codes require a scanner to read identification authentication, and the two-dimensional codes belong to passive identification; the second type is that an internal identity such as a SIM (Subscriber Identity Module, subscriber identity module card) carrier is embedded in a product, and the identity can only be written into the product along with the installation of the SIM carrier in the manufacturing stage, and the situation that one SIM carrier stores a plurality of products and one product has a plurality of identities cannot be realized.
The security chip has certain advantages as an active identification carrier, can quickly help customers integrate identification issuing and storage capacity, ensures the non-tamper property of the identification, can provide security communication and authentication service, and ensures the security and credibility of an identification system. In different life cycle stages of production, storage, logistics, sales, service and the like of products, the identification service platform writes a product credible identification and a safety identification key of the corresponding stage into the safety chip, one identification can be indexed to one business service platform, business management of the life cycle stage can be carried out on the products after identification authentication, and effective anti-counterfeiting authentication and full life cycle management of intelligent products are realized through a plurality of credible identification correlations. Meanwhile, in the service providing stage, the main product integrating the security chip can be connected with a plurality of auxiliary products through various interfaces, trusted identifications and security identification keys of the auxiliary products can be applied to the identification service platform through the main product, the trusted identifications and the security identification keys are written into the security chip, and the processes of security authentication of the auxiliary products and the identification service platform, service interaction with corresponding service platform and the like are realized by the main product in the network such as the narrowband Internet of things, the 2G, the 4G, the 5G and the like.
Disclosure of Invention
The embodiment of the invention provides a product identification authentication method and device, which are used for solving the problem that in the existing product identification authentication method based on an SIM carrier, a product corresponds to one identification and is stored in the SIM carrier, and the identification can only be written into the product along with the installation of the SIM carrier in the production and manufacturing stage.
In order to solve the technical problems, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a product identifier authentication method, which is applied to a terminal, and includes:
reading a target identifier of a target product stored in a security chip and an identifier key corresponding to the target identifier;
performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result;
generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result;
sending the first identification analysis authentication request message to an identifiable identification analysis platform;
and receiving a first identification authentication result fed back by the trusted identification analysis platform, wherein the first identification authentication result carries identification information corresponding to the target identification.
Optionally, before reading the target identifier of the target product stored in the security chip and the identifier key corresponding to the target identifier, the method further includes:
If a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product;
and reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip.
Optionally, encrypting the service data of the target product through the security chip to obtain encrypted service data;
carrying out authentication calculation on the encrypted service data through the identification key of the target identification;
generating a service data message, wherein the service data message comprises encrypted service data after authentication calculation;
and sending the service data message to a service platform.
Optionally, the identification of the product stored in the security chip is written in a preset mode and a post-writing mode.
Optionally, the terminal is connected with other terminals of the Internet of things; receiving an identification writing application of a product sent by the other internet of things terminal; writing the received identification of the product into the security chip.
Optionally, the writing the received identification of the product into the security chip includes:
performing authentication calculation on the identification of the product by adopting an identification key in the identification of the product to obtain a second authentication calculation result;
Generating a second identification analysis authentication request message of the identification of the product, wherein the second identification analysis authentication request message contains the second authentication calculation result;
sending the second identification analysis authentication request message to an identifiable identification analysis platform;
receiving a second identification authentication result fed back by the trusted identification analysis platform;
and writing the product identifier and the corresponding identifier key into the security chip.
Optionally, the terminal is connected with other terminals of the internet of things by adopting a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near field wireless communication technology.
Optionally, the security chip stores at least one identifier of a product, each product including at least one identifier, and each identifier corresponds to an identifier key.
Optionally, the security chip further stores a data storage unit including at least one of: identifying an index; the trusted identifier resolves the platform address.
In a second aspect, an embodiment of the present invention provides a product identifier authentication method, which is applied to an trusted identifier analysis platform, including:
receiving a first identification analysis authentication request message sent by a terminal; the first identification analysis authentication request message comprises a first authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
The first identification analysis authentication request message is sent to a security authentication service platform for identification authentication;
receiving a first identification authentication result fed back by the security authentication service platform;
if the identification authentication is passed, the identification authentication result is sent to the trusted identification analysis platform, and the first identification authentication result carries identification information corresponding to the target identification.
In a third aspect, an embodiment of the present invention provides a product identifier authentication device, including:
the reading module is used for reading the target identifier of the target product stored in the security chip and the identification key corresponding to the target identifier;
the authentication calculation module is used for carrying out authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result;
the first processing module is used for generating a first identification analysis authentication request message which contains the first authentication calculation result;
the first sending module is used for sending the first identification analysis authentication request message to an identifiable identification analysis platform;
the first receiving module is used for receiving a first identification authentication result fed back by the identification analysis platform, and if the identification authentication is passed, the identification authentication result carries identification information corresponding to the target identification.
In a fourth aspect, an embodiment of the present invention provides a product identifier authentication device, including:
the second receiving module is used for receiving an identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
the second sending module is used for sending the identification analysis authentication request message to a security authentication service platform for identification authentication;
the third receiving module is used for receiving the identification authentication result fed back by the security authentication service platform;
and the third sending module is used for sending the identification authentication result to the bearable identification analysis platform if the identification authentication is passed, wherein the identification authentication result carries identification information corresponding to the target identification.
In a fifth aspect, an embodiment of the present invention provides a product identifier authentication device, including: a transceiver and a processor;
the processor is used for reading a target identifier of a target product stored in the security chip and an identification key corresponding to the target identifier;
the processor is used for generating an identification analysis authentication request message which contains a first authentication calculation result;
The processor is configured to generate a first identifier resolution authentication request packet, where the first identifier resolution authentication request packet includes the first authentication calculation result;
the transceiver is used for sending the first identification analysis authentication request message to an identifiable identification analysis platform;
the transceiver is configured to receive a first identifier authentication result fed back by the trusted identifier analysis platform, and if the identifier authentication is passed, the identifier authentication result carries identifier information corresponding to the target identifier.
In a sixth aspect, an embodiment of the present invention provides a product identifier authentication device, including: a transceiver and a processor;
the transceiver is used for receiving an identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
the transceiver is used for sending the identification analysis authentication request message to a security authentication service platform for identification authentication;
the transceiver is used for receiving the identification authentication result fed back by the security authentication service platform;
and the transceiver is used for sending the identification authentication result to the bearable identification analysis platform if the identification authentication is passed, wherein the identification authentication result carries identification information corresponding to the target identification.
A seventh aspect provides a terminal, including: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the product identification authentication method according to the first aspect.
In an eighth aspect, there is provided an trusted beacon resolution platform comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the product identification authentication method according to the first aspect.
A ninth aspect provides a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, the computer program implementing the steps of the product identification authentication method according to the first aspect when being executed by a processor.
In the embodiment of the invention, through writing one product into a plurality of identifications and corresponding multiple groups of identification keys, and by means of the capability of an identifiable identification analysis platform, all enterprise product identifications, identification keys and enterprise information are managed in a unified way, and safe data interaction is performed, so that on-line maintenance and management of information in a whole life cycle of the product are realized.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to identify like elements throughout the drawings. In the drawings:
fig. 1 is a schematic flow chart of a product identifier authentication method applied to a terminal according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a storage structure of a security chip in a product identifier authentication method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a process of writing an identifier in a product identifier authentication method according to an embodiment of the present invention;
fig. 4 is a schematic flow chart of a product identifier authentication method applied to an trusted identifier analysis platform according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a product identifier authentication device applied to a terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a product identifier authentication device applied to an trusted identifier analysis platform according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a transceiver applied to a terminal according to an embodiment of the present invention;
Fig. 8 is a schematic structural diagram of an trusted identification resolution platform according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of an trusted identification resolution platform according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, an embodiment of the present invention provides a product identifier authentication method, which is applied to a terminal, and includes:
step 11: reading a target identifier of a target product stored in a security chip and an identifier key corresponding to the target identifier;
step 12: performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result;
step 13: generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result;
Step 14: sending the first identification analysis authentication request message to an identifiable identification analysis platform;
step 15: and receiving a first identification authentication result fed back by the trusted identification analysis platform, wherein the first identification authentication result carries identification information corresponding to the target identification.
In the embodiment of the present invention, in step 11, if there are multiple identifiers in the target product, only the currently activated target identifier is obtained through the identifier index; the authentication calculation is not limited to use of symmetric keys, asymmetric keys, international algorithms, national encryption algorithms and the like; the identification key is not limited to symmetric keys, asymmetric keys, etc.; in step 14, the trusted identification analysis platform performs authentication calculation verification on the product identification and the identification analysis authentication request through the security authentication service platform, and if the verification is passed, the current analysis request is from a legal product; in step 15, the trusted identification analysis platform stores identification information of the target identification, where the identification information includes information such as a location of an enterprise node.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
In this embodiment of the present invention, optionally, before reading the target identifier of the target product stored in the security chip and the identifier key corresponding to the target identifier, the method further includes:
if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product;
and reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip.
In the embodiment of the present invention, referring to fig. 2, the identifiers 0 to N identify the identification information of different life cycles or different usage phases of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the product; the trusted identification analysis platform address is used for storing the platform address of the product corresponding identification analysis service; other information is optionally written, and can be used for storing customized information such as security configuration information of products, wherein the products such as water meters, electric meters and gas meters can be connected with the industry analysis platform through a home gateway so as to be indexed to a service platform.
In the embodiment of the invention, optionally, the security chip encrypts the service data of the target product to obtain encrypted service data;
carrying out authentication calculation on the encrypted service data through the identification key of the target identification;
generating a service data message, wherein the service data message comprises encrypted service data after authentication calculation;
and sending the service data message to a service platform.
In the embodiment of the invention, the service platform can request the security authentication service platform to authenticate the service data message according to the identification of the target product, confirm the legal identity, decrypt the service data message by using the corresponding service communication identification key to obtain service data, and return the service data to the service platform to further carry out the subsequent service interaction flow.
In the embodiment of the invention, optionally, the identifier of the product stored in the security chip is written in a preset mode and a post-writing mode.
In the embodiment of the invention, a honeycomb module and a safety chip are embedded in the product in the production and manufacturing stage, and the mark writing of the product can usually adopt a preset mode and a post-writing mode, but because the customization degree of the product mark of each enterprise and industry is high, the production efficiency is greatly reduced by writing personalized information in the initial stage of the safety chip; in order to improve the production efficiency of the identification carrier and ensure the safety level of the subsequent written identification, the safety authentication service platform uniformly distributes the initial identification of the safety chip and the identification key of the corresponding identification thereof in the production stage of the safety chip, and presets the initial identification and the identification key of the corresponding identification into the safety chip together with the authentication center identification in a safe environment to finish production; the identification can be written by means of post-writing throughout the life cycle of the product afterwards.
In the embodiment of the invention, the terminal is optionally connected with other terminals of the Internet of things; receiving an identification writing application of a product sent by the other internet of things terminal; writing the received identification of the product into the security chip.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In an embodiment of the present invention, optionally, the writing the received identifier of the product into the security chip includes:
step 31: performing authentication calculation on the identification of the product by adopting an identification key in the identification of the product to obtain a second authentication calculation result;
step 32: generating a second identification analysis authentication request message of the identification of the product, wherein the second identification analysis authentication request message contains the second authentication calculation result;
Step 33: sending the second identification analysis authentication request message to an identifiable identification analysis platform;
step 34: receiving a second identification authentication result fed back by the trusted identification analysis platform;
step 35: and writing the product identifier and the corresponding identifier key into the security chip.
In the embodiment of the invention, after the other internet terminals are accessed to the security chip, the initial identification of the security chip is actively acquired, and the product information of the other internet terminals is sent to the security chip; in step 33, the trusted identification analysis platform sends the received information to the security authentication service platform for authentication calculation and authentication, if the authentication calculation and authentication pass, the identification is a trusted identification, if the authentication fails, the identification is sent as counterfeit equipment, and the subsequent flow is refused; the safety authentication service platform can push the product information to an enterprise service platform for centralized management.
In the embodiment of the invention, in the process of writing the identifier, the initial identifier is adopted in the request message of the identifier to carry out authentication calculation and authentication on the message by the security authentication service platform, so as to finish the authentication of the security chip by the platform, the security authentication service platform is used for carrying out authentication calculation on the information, and the chip is used for carrying out authentication calculation and authentication on the information, so as to finish the authentication of the platform by the chip; thus, a security trust chain of the whole identifier is constructed, and the customization of the identifier and the release of a security identifier key are realized; in the identification analysis process, a security authentication flow is added for the identification analysis process, and the analysis request is confirmed to come from a legal industrial Internet product terminal, so that the falsified and tampered identification issuing analysis request can be effectively prevented, and information leakage and damage are caused; in the service interaction flow, based on the credible authentication of identification analysis, the enterprise clients are helped to realize the interaction of the safety data by utilizing the identification key storage and operation capability of the safety chip, and the end-to-end safety capability is realized.
In the embodiment of the invention, a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near field wireless communication technology are optionally adopted to be connected with other terminals of the Internet of things.
In an embodiment of the present invention, optionally, the security chip stores at least one identifier of a product, where each product includes at least one identifier, and each identifier corresponds to an identifier key.
In an embodiment of the present invention, optionally, the security chip further stores a data structure including at least one of: identifying an index; the trusted identifier resolves the platform address.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
Referring to fig. 4, an embodiment of the present invention provides a product identifier authentication method applied to an trusted identifier analysis platform, including:
step 41: receiving a first identification analysis authentication request message sent by a terminal; the first identification analysis authentication request message comprises a first authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
step 42: the first identification analysis authentication request message is sent to a security authentication service platform for identification authentication;
step 43: receiving a first identification authentication result fed back by the security authentication service platform;
step 44: if the identification authentication is passed, the identification authentication result is sent to the trusted identification analysis platform, and the first identification authentication result carries identification information corresponding to the target identification.
In the embodiment of the invention, by means of the capability of the trusted identification analysis platform, all enterprise product identifications, identification keys and enterprise information are managed in a unified way, so that the identification analysis and the trusted identification of the identifications are realized, and the trusted identification is indexed to the service platform to perform secure data interaction.
Referring to fig. 5, an embodiment of the present invention provides a product identifier authentication device, including:
The reading module 51 is configured to read a target identifier of a target product stored in the security chip and an identifier key corresponding to the target identifier;
an authentication calculation module 52, configured to perform authentication calculation on the target identifier by using the identifier key, so as to obtain a first authentication calculation result;
the first processing module 53 is configured to generate a first identifier resolution authentication request packet, where the first identifier resolution authentication request packet includes the first authentication calculation result;
a first sending module 54, configured to send the first identifier resolution authentication request packet to an bearable identifier resolution platform;
the first receiving module 55 is configured to receive a first identifier authentication result fed back by the trusted identifier analysis platform, where the identifier authentication result carries identifier information corresponding to the target identifier if the identifier authentication is passed.
In the embodiment of the present invention, in the reading module 51, if there are multiple identifiers in the target product, only the currently activated target identifier is obtained through the identifier index; in the first sending module 54, the trusted platform performs authentication calculation and verification on the product identifier and the identifier analysis authentication request through the secure authentication service platform, and if the verification is passed, it indicates that the current analysis request is from a legal product; in the first receiving module 55, the identifier information of the target identifier is stored in the identifier resolution platform, where the identifier information includes information such as a location of an enterprise node.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
In this embodiment of the present invention, optionally, before reading the target identifier of the target product stored in the security chip and the identifier key corresponding to the target identifier, the method further includes:
the first processing sub-module is used for acquiring the currently activated identification index of the target product if a plurality of identifications of the target product are stored in the security chip;
and the first reading submodule is used for reading the target identifier corresponding to the identifier index and the identifier key corresponding to the target identifier stored in the security chip.
In the embodiment of the present invention, referring to fig. 2, the identifiers 0 to N identify the identification information of different life cycles or different usage phases of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the product; the trusted identification analysis platform address is used for storing the platform address of the product corresponding identification analysis service; other information is optionally written, and can be used for storing customized information such as security configuration information of products, wherein the products such as water meters, electric meters and gas meters can be connected with the industry analysis platform through a home gateway so as to be indexed to a service platform.
In an embodiment of the present invention, the method, optionally,
the second processing sub-module is used for encrypting the service data of the target product through the security chip to obtain encrypted service data;
the third processing sub-module is used for carrying out authentication calculation on the encrypted service data through the identification key of the target identification;
a fourth processing sub-module, configured to generate a service data packet, where the service data packet includes encrypted service data after authentication calculation;
and the first sending sub-module is used for sending the business data message to a business service platform.
In the embodiment of the invention, the service platform can request the security authentication service platform to authenticate the service data message according to the identification of the target product, confirm the legal identity, decrypt the service data message by using the corresponding service communication identification key to obtain service data, and return the service data to the service platform to further carry out the subsequent service interaction flow.
In the embodiment of the invention, optionally, the identifier of the product stored in the security chip is written in a preset mode and a post-writing mode.
In the embodiment of the invention, a honeycomb module and a safety chip are embedded in the product in the production and manufacturing stage, and the mark writing of the product can usually adopt a preset mode and a post-writing mode, but because the customization degree of the product mark of each enterprise and industry is high, the production efficiency is greatly reduced by writing personalized information in the initial stage of the safety chip; in order to improve the production efficiency of the identification carrier and ensure the safety level of the subsequent written identification, the safety authentication service platform uniformly distributes the initial identification of the safety chip and the identification key of the corresponding identification thereof in the production stage of the safety chip, and presets the initial identification and the identification key of the corresponding identification into the safety chip together with the authentication center identification in a safe environment to finish production; the identification can be written by means of post-writing throughout the life cycle of the product afterwards.
In an embodiment of the present invention, optionally, the method further includes: the fifth processing sub-module is connected with other terminals of the Internet of things; receiving an identification writing application of a product sent by the other internet of things terminal; writing the received identification of the product into the security chip.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In the embodiment of the invention, a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near field wireless communication technology are optionally adopted to be connected with other terminals of the Internet of things.
In an embodiment of the present invention, optionally, the security chip stores at least one identifier of a product, where each product includes at least one identifier, and each identifier corresponds to an identifier key.
In an embodiment of the present invention, optionally, the security chip further stores a data structure including at least one of: identifying an index; the trusted identifier resolves the platform address.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
Referring to fig. 6, an embodiment of the present invention provides a product identifier authentication device, including:
a second receiving module 61, for receiving the identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
the second sending module 62 is configured to send the identifier resolution authentication request packet to a security authentication service platform for identifier authentication;
A third receiving module 63, configured to receive an identification authentication result fed back by the security authentication service platform;
and a third sending module 64, configured to send the identification authentication result to the trusted identification analysis platform if the identification authentication passes, where the identification authentication result carries identification information corresponding to the target identification.
In the embodiment of the invention, by means of the capability of the trusted identification analysis platform, all enterprise product identifications, identification keys and enterprise information are managed in a unified way, so that the identification analysis and the trusted identification of the identifications are realized, and the trusted identification is indexed to the service platform to perform secure data interaction.
Referring to fig. 7, an embodiment of the present invention provides a product identifier authentication device, including: a transceiver and a processor;
the processor is used for reading a target identifier of a target product stored in the security chip and an identification key corresponding to the target identifier;
the processor is used for generating an identification analysis authentication request message which contains a first authentication calculation result;
the processor is configured to generate a first identifier resolution authentication request packet, where the first identifier resolution authentication request packet includes the first authentication calculation result;
The transceiver is used for sending the first identification analysis authentication request message to an identifiable identification analysis platform;
the transceiver is configured to receive a first identifier authentication result fed back by the trusted identifier analysis platform, and if the identifier authentication is passed, the identifier authentication result carries identifier information corresponding to the target identifier.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
In this embodiment of the present invention, optionally, before reading the target identifier of the target product stored in the security chip and the identifier key corresponding to the target identifier, the method further includes:
the processor is used for acquiring the currently activated identification index of the target product if a plurality of identifications of the target product are stored in the security chip;
the transceiver is used for reading the target identifier corresponding to the identifier index and the identifier key corresponding to the target identifier stored in the security chip.
In the embodiment of the present invention, referring to fig. 2, the identifiers 0 to N identify the identification information of different life cycles or different usage phases of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the product; the trusted identification analysis platform address is used for storing the platform address of the product corresponding identification analysis service; other information is optionally written, and can be used for storing customized information such as security configuration information of products, wherein the products such as water meters, electric meters and gas meters can be connected with the industry analysis platform through a home gateway so as to be indexed to a service platform.
In an embodiment of the present invention, optionally, the method further includes:
the processor is used for encrypting the service data of the target product through the security chip to obtain encrypted service data;
the processor is used for carrying out authentication calculation on the encrypted service data through the identification key of the target identification;
the processor is used for generating a service data message, wherein the service data message contains encrypted service data after authentication calculation;
The transceiver is used for sending the service data message to a service platform.
In the embodiment of the invention, the service platform can request the security authentication service platform to authenticate the service data message according to the identification of the target product, confirm the legal identity, decrypt the service data message by using the corresponding service communication identification key to obtain service data, and return the service data to the service platform to further carry out the subsequent service interaction flow.
In the embodiment of the invention, optionally, the identifier of the product stored in the security chip is written in a preset mode and a post-writing mode.
In the embodiment of the invention, a honeycomb module and a safety chip are embedded in the product in the production and manufacturing stage, and the mark writing of the product can usually adopt a preset mode and a post-writing mode, but because the customization degree of the product mark of each enterprise and industry is high, the production efficiency is greatly reduced by writing personalized information in the initial stage of the safety chip; in order to improve the production efficiency of the identification carrier and ensure the safety level of the subsequent written identification, the safety authentication service platform uniformly distributes the initial identification of the safety chip and the identification key of the corresponding identification thereof in the production stage of the safety chip, and presets the initial identification and the identification key of the corresponding identification into the safety chip together with the authentication center identification in a safe environment to finish production; the identification can be written by means of post-writing throughout the life cycle of the product afterwards.
In an embodiment of the present invention, optionally, the method further includes: the processor is connected with other terminals of the Internet of things; receiving an identification writing application of a product sent by the other internet of things terminal; writing the received identification of the product into the security chip.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In the embodiment of the invention, a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near field wireless communication technology are optionally adopted to be connected with other terminals of the Internet of things.
In an embodiment of the present invention, optionally, the security chip stores at least one identifier of a product, where each product includes at least one identifier, and each identifier corresponds to an identifier key.
In an embodiment of the present invention, optionally, the security chip further stores a data structure including at least one of: identifying an index; the trusted identifier resolves the platform address.
In the embodiment of the invention, the secure chip can be connected with other terminals of the internet of things through a universal asynchronous receiving and transmitting transmitter, a two-wire synchronous serial bus, a serial peripheral interface, bluetooth and a near-field wireless communication technology, so that one or more identifications of multiple products and identification keys corresponding to the identifications are stored in the secure chip, and the carried products can realize interaction with a secure authentication service platform and a business service platform through the products carrying the secure chip.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
Referring to fig. 8, an embodiment of the present invention provides a product identifier authentication device, including: a transceiver and a processor;
the transceiver is used for receiving an identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification;
The transceiver is used for sending the identification analysis authentication request message to a security authentication service platform for identification authentication;
the transceiver is used for receiving the identification authentication result fed back by the security authentication service platform;
and the transceiver is used for sending the identification authentication result to the bearable identification analysis platform if the identification authentication is passed, wherein the identification authentication result carries identification information corresponding to the target identification.
In the embodiment of the invention, the product is written into a plurality of identifications and corresponding multiple groups of identification keys, and all enterprise product identifications, identification keys and enterprise information are uniformly managed by means of the capability of the identification analysis platform, so that safe data interaction is performed, and the on-line maintenance and management of the information in the whole life cycle of the product are realized.
Referring to fig. 9, the embodiment of the present invention further provides a terminal 90, which includes a processor 91, a memory 92, and a computer program stored in the memory 92 and capable of running on the processor 91, where the computer program when executed by the processor 91 implements the above-mentioned processes of the product identifier authentication method embodiment applied to the terminal, and the same technical effects can be achieved, and for avoiding repetition, a detailed description is omitted herein.
Referring to fig. 10, the embodiment of the present invention further provides an trusted identification analysis platform 100, which includes a processor 101, a memory 102, and a computer program stored in the memory 102 and capable of running on the processor 101, where the computer program when executed by the processor 101 implements the above processes of the product identification authentication method embodiment applied to the trusted identification analysis platform, and can achieve the same technical effects, so that repetition is avoided and redundant description is omitted herein.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements each process of the product identification authentication method embodiment described above, and can achieve the same technical effect, so that repetition is avoided, and no further description is provided herein. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.
Claims (16)
1. A product identification authentication method applied to a terminal, comprising the following steps:
reading a target identifier of a target product stored in a security chip and an identifier key corresponding to the target identifier;
performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result;
generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result;
sending the first identification analysis authentication request message to an identifiable identification analysis platform;
receiving a first identification authentication result fed back by the trusted identification analysis platform, wherein the first identification authentication result carries identification information corresponding to the target identification;
before reading the target identifier of the target product stored in the security chip and the identifier key corresponding to the target identifier, the method further comprises the following steps:
if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product;
And reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip.
2. The product identification authentication method of claim 1, further comprising:
encrypting the service data of the target product through the security chip to obtain encrypted service data;
carrying out authentication calculation on the encrypted service data through the identification key of the target identification;
generating a service data message, wherein the service data message comprises encrypted service data after authentication calculation;
and sending the service data message to a service platform.
3. The product identification authentication method of claim 1, wherein the identification of the product stored in the security chip is written in a preset manner and a post-writing manner.
4. The product identification authentication method of claim 1, further comprising:
the terminal is connected with other terminals of the Internet of things;
receiving an identification writing application of a product sent by the other internet of things terminal;
and writing the identification of the product which is received and sent by the trusted identification analysis platform into the security chip.
5. The product identification authentication method of claim 4, wherein writing the received identification of the product to the security chip comprises:
Performing authentication calculation on the identification of the product by adopting an identification key in the identification of the product to obtain a second authentication calculation result;
generating a second identification analysis authentication request message of the identification of the product, wherein the second identification analysis authentication request message contains the second authentication calculation result;
sending the second identification analysis authentication request message to an identifiable identification analysis platform;
receiving a second identification authentication result fed back by the trusted identification analysis platform;
and writing the product identifier and the corresponding identifier key into the security chip.
6. The product identification authentication method as claimed in claim 4, wherein,
the universal asynchronous receiving and transmitting transmitter, the two-wire synchronous serial bus, the serial peripheral interface, the Bluetooth and the near field wireless communication technology are adopted to be connected with other terminals of the Internet of things.
7. The product identification authentication method as claimed in claim 1, wherein,
the security chip stores identifications of at least one product, each product including at least one identification, each identification corresponding to an identification key.
8. The product identification authentication method as claimed in claim 7, wherein,
the security chip further stores a memory comprising at least one of: identifying an index; the trusted identifier resolves the platform address.
9. The product identification authentication method is applied to an identifiable analysis platform and is characterized by comprising the following steps of:
receiving a first identification analysis authentication request message sent by a terminal; the first identification analysis authentication request message comprises a first authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification; the terminal reads a target identifier of a target product stored in the security chip and an identifier key corresponding to the target identifier; performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result; generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result; if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product; reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip;
The first identification analysis authentication request message is sent to a security authentication service platform for identification authentication;
receiving a first identification authentication result fed back by the security authentication service platform;
if the identification authentication is passed, the identification authentication result is sent to an identifiable identification analysis platform, and the first identification authentication result carries identification information corresponding to the target identification.
10. A product identification authentication device, comprising:
the reading module is used for reading the target identifier of the target product stored in the security chip and the identification key corresponding to the target identifier;
the authentication calculation module is used for carrying out authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result;
the first processing module is used for generating a first identification analysis authentication request message which contains the first authentication calculation result;
the first sending module is used for sending the first identification analysis authentication request message to an identifiable identification analysis platform;
the first receiving module is used for receiving a first identification authentication result fed back by the identification analysis platform, and if the identification authentication is passed, the identification authentication result carries identification information corresponding to the target identification;
Further comprises:
the first processing sub-module is used for acquiring the currently activated identification index of the target product if a plurality of identifications of the target product are stored in the security chip; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product;
and the first reading submodule is used for reading the target identifier corresponding to the identifier index and the identifier key corresponding to the target identifier stored in the security chip.
11. A product identification authentication device, comprising:
the second receiving module is used for receiving an identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification; the terminal reads a target identifier of a target product stored in the security chip and an identifier key corresponding to the target identifier; performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result; generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result; if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product; reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip;
The second sending module is used for sending the identification analysis authentication request message to a security authentication service platform for identification authentication;
the third receiving module is used for receiving the identification authentication result fed back by the security authentication service platform;
and the third sending module is used for sending the identification authentication result to the bearable identification analysis platform if the identification authentication is passed, wherein the identification authentication result carries identification information corresponding to the target identification.
12. A product identification authentication device, comprising: a transceiver and a processor;
the processor is used for reading a target identifier of a target product stored in the security chip and an identification key corresponding to the target identifier; if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product; reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip;
the processor is used for generating an identification analysis authentication request message which contains a first authentication calculation result;
The processor is configured to generate a first identifier resolution authentication request packet, where the first identifier resolution authentication request packet includes the first authentication calculation result;
the transceiver is used for sending the first identification analysis authentication request message to an identifiable identification analysis platform;
the transceiver is configured to receive a first identifier authentication result fed back by the trusted identifier analysis platform, and if the identifier authentication is passed, the identifier authentication result carries identifier information corresponding to the target identifier.
13. A product identification authentication device, comprising: a transceiver and a processor;
the transceiver is used for receiving an identification analysis authentication request message sent by the terminal; the identification analysis authentication request message comprises an authentication calculation result of performing authentication calculation on the target identification by adopting an identification key of the target identification; the terminal reads a target identifier of a target product stored in the security chip and an identifier key corresponding to the target identifier; performing authentication calculation on the target identifier by adopting the identifier key to obtain a first authentication calculation result; generating a first identification analysis authentication request message, wherein the first identification analysis authentication request message comprises the first authentication calculation result; if a plurality of identifiers of the target product are stored in the security chip, acquiring a currently activated identifier index of the target product; the identification index represents the identification information of the current activation of the product and is used for identifying the current life cycle state or service stage of the target product; reading a target identifier corresponding to the identifier index and an identifier key corresponding to the target identifier stored in the security chip;
The transceiver is used for sending the identification analysis authentication request message to a security authentication service platform for identification authentication;
the transceiver is used for receiving the identification authentication result fed back by the security authentication service platform;
and the transceiver is used for sending the identification authentication result to the bearable identification analysis platform if the identification authentication is passed, wherein the identification authentication result carries identification information corresponding to the target identification.
14. A terminal, comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the product identification authentication method according to any one of claims 1 to 9.
15. An trusted identification resolution platform, comprising: a processor, a memory and a program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the product identification authentication method according to any one of claims 1 to 9.
16. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the product identification authentication method according to any of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011410139.5A CN114666074B (en) | 2020-12-04 | 2020-12-04 | Product identification authentication method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011410139.5A CN114666074B (en) | 2020-12-04 | 2020-12-04 | Product identification authentication method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114666074A CN114666074A (en) | 2022-06-24 |
CN114666074B true CN114666074B (en) | 2024-04-09 |
Family
ID=82025159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011410139.5A Active CN114666074B (en) | 2020-12-04 | 2020-12-04 | Product identification authentication method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114666074B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117896188B (en) * | 2024-03-14 | 2024-06-04 | 杭州海康威视数字技术股份有限公司 | Safety analysis method, device, equipment and system for equipment identification |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873587A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Wireless communication device and method for realizing service security thereof |
CN102595213A (en) * | 2012-02-22 | 2012-07-18 | 深圳创维-Rgb电子有限公司 | Security certificate method and system of credible TV terminal |
CN108512862A (en) * | 2018-05-30 | 2018-09-07 | 博潮科技(北京)有限公司 | Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques |
CN109041052A (en) * | 2018-07-02 | 2018-12-18 | 北京市燃气集团有限责任公司 | A kind of safety communicating method and system based on marking algorithm |
CN109361669A (en) * | 2018-10-19 | 2019-02-19 | 铂有限公司 | Identity identifying method, device and the equipment of communication equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105378774A (en) * | 2013-03-12 | 2016-03-02 | 英特托拉斯技术公司 | Secure transaction systems and methods |
-
2020
- 2020-12-04 CN CN202011410139.5A patent/CN114666074B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873587A (en) * | 2010-05-27 | 2010-10-27 | 大唐微电子技术有限公司 | Wireless communication device and method for realizing service security thereof |
CN102595213A (en) * | 2012-02-22 | 2012-07-18 | 深圳创维-Rgb电子有限公司 | Security certificate method and system of credible TV terminal |
CN108512862A (en) * | 2018-05-30 | 2018-09-07 | 博潮科技(北京)有限公司 | Internet-of-things terminal safety certification control platform based on no certificates identified authentication techniques |
CN109041052A (en) * | 2018-07-02 | 2018-12-18 | 北京市燃气集团有限责任公司 | A kind of safety communicating method and system based on marking algorithm |
CN109361669A (en) * | 2018-10-19 | 2019-02-19 | 铂有限公司 | Identity identifying method, device and the equipment of communication equipment |
Non-Patent Citations (1)
Title |
---|
可信计算中 PrivacyCA 系统的研究与实现;李超零;中国优秀硕士学位论文全文数据库;20120215;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114666074A (en) | 2022-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2487629B1 (en) | Secure smart poster | |
CN101777978B (en) | Method and system based on wireless terminal for applying digital certificate and wireless terminal | |
CN110611563B (en) | Equipment identification code distribution method and device and Internet of things equipment | |
JP6652767B2 (en) | Methods for managing the status of connected devices | |
KR100636111B1 (en) | Method protecting data stored in lost mobile terminal and recording medium therefor | |
KR100805273B1 (en) | Method and system for identfying information of product in display or in buy with radio frequency identification system and recording medium thereof | |
EP3698535A1 (en) | Privacy preserving tag | |
CN107231231B (en) | Method and system for terminal equipment to safely access Internet of things | |
CN102855577B (en) | Multiple commodity antifake check method based on cloud computing | |
CN103154966A (en) | System and methods for remote maintenance in an electronic network with multiple clients | |
KR20130026423A (en) | Method for identifying and authenticating an rfid tag by a reader | |
Saeed et al. | Off-line nfc tag authentication | |
CN113472716B (en) | System access method, gateway device, server, electronic device and storage medium | |
CN110969445B (en) | NFC-based anti-counterfeiting method | |
CN111880919B (en) | Data scheduling method, system and computer equipment | |
CN101667257A (en) | Empty card for wireless card writing, wireless card writing server and method | |
CN104809618A (en) | Radio frequency identification tag-based product anti-counterfeiting method | |
CN103856940A (en) | Security authentication method and system | |
CN101951371B (en) | Method for authenticating electronic tags in Internet of things | |
CN114666074B (en) | Product identification authentication method and device | |
CN110533128B (en) | Encryption-based anti-counterfeiting traceability data processing method, device, system and medium | |
Gandino et al. | A security protocol for RFID traceability | |
CN105357015A (en) | Internet of things (IOT) security authentication method | |
CN115362700A (en) | Method and apparatus for managing events of intelligent security platform | |
CN104168362A (en) | Terminal, two-dimensional management apparatus, and electronic card management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |