CN115051871A - Authentication method and device, and storage medium - Google Patents

Authentication method and device, and storage medium Download PDF

Info

Publication number
CN115051871A
CN115051871A CN202210762998.3A CN202210762998A CN115051871A CN 115051871 A CN115051871 A CN 115051871A CN 202210762998 A CN202210762998 A CN 202210762998A CN 115051871 A CN115051871 A CN 115051871A
Authority
CN
China
Prior art keywords
authentication
ciphertext data
data
key
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210762998.3A
Other languages
Chinese (zh)
Other versions
CN115051871B (en
Inventor
何贤卫
张辉
刘大勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuxi Ruiqin Technology Co Ltd
Original Assignee
Wuxi Ruiqin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuxi Ruiqin Technology Co Ltd filed Critical Wuxi Ruiqin Technology Co Ltd
Priority to CN202210762998.3A priority Critical patent/CN115051871B/en
Publication of CN115051871A publication Critical patent/CN115051871A/en
Application granted granted Critical
Publication of CN115051871B publication Critical patent/CN115051871B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data communication, and discloses an authentication method, authentication equipment and a storage medium. The authentication method comprises the following steps: the encryption and decryption server generates a private key and a public key which are matched, the private key is stored at the local terminal, and the public key and a corresponding secret key ID are distributed to the terminal product; the control equipment sends a key inquiry command and an authentication random number application to the terminal product; the terminal product generates a random number and encrypts the random number to obtain first ciphertext data and returns the first ciphertext data and the secret key ID to the control equipment, and the control equipment uploads the first ciphertext data and the secret key ID to the encryption and decryption server; the encryption and decryption server decrypts the first ciphertext data to obtain first plaintext data, encrypts the first plaintext data through a private key to form second ciphertext data, sends the second ciphertext data to the control device, and sends the second ciphertext data to the terminal product through the control device; and the terminal product decrypts the second ciphertext data to obtain second plaintext data, and compares the second plaintext data with the random number to obtain an authentication result. The embodiment of the invention has the advantages of no region limitation in application, higher safety and flexible key change.

Description

Authentication method and device, and storage medium
Technical Field
The present invention relates to the field of data communication technologies, and in particular, to an authentication method and device, and a storage medium.
Background
The mobile terminal needs to be controlled by the control device in the whole life cycle to complete actions such as data burning, data writing and reading. The common control methods are: the control equipment issues instruction data of a protocol with the terminal product, and the terminal product responds to the action of the protocol. The risks associated with this approach are: if the protocol is cracked, the terminal product is controlled by the illegal equipment according to the protocol to perform corresponding illegal operation, so that the original functions of the terminal product, such as the special data function of the terminal and the specific parameter data of the product, are damaged, the safety of the terminal product cannot be guaranteed, and finally the terminal product is damaged.
In order to reduce the risk of illegal control, authentication is often required for the control device, and a common authentication method mainly includes: the hardware encryption module authorized legally is externally connected to the control equipment to authenticate the equipment; then, the control right validity of the control equipment is authenticated (namely, the terminal product sends original data to the control equipment, the control equipment encrypts the transmission protocol data through tool software running at the side and then returns the encrypted data to the terminal product, the terminal product decrypts the encrypted data and then compares the decrypted data with the original data), and after the authentication is passed, the terminal product side opens a normal control channel, so that the data communication control of the control equipment on the terminal product is completed, and the protection of the terminal product is achieved.
In this conventional scheme, as long as the hardware encryption module is connected to the device, the device is considered as a legal device, and the control terminal performs the encryption and decryption operations of the transmission protocol data by using the hardware encryption module of the local terminal, which has the following problems:
(1) in order to update the key data, the hardware encryption device needs to be recycled to the key application center to write a new key, so that the period is long, the hardware encryption device is easy to lose and can be used for illegal operation by lawless persons, and in addition, the hardware encryption device depends on hardware drive and can be intercepted by the lawless persons on a drive layer.
Therefore, if the hardware encryption module and the control device flow out of the market or the hardware encryption module is cracked, illegal control operations such as illegal software version upgrading, product serial number rewriting and the like can be easily performed on the terminal product, thereby causing damage to the whole terminal product market.
(2) The equipment encryption depends on a hardware encryption device, such as global use, is limited by regions, and the global delivery period of the hardware encryption device is long, so that the universality is poor.
Disclosure of Invention
The invention aims to provide an authentication method, an authentication device and a storage medium, which are used for overcoming the defects of poor safety controllability and poor universality of the conventional authentication method.
In order to achieve the purpose, the invention adopts the following technical scheme:
an authentication method, the authentication method comprising the step of authenticating the validity of a control right of a control device:
the encryption and decryption server generates a matched private key and a public key, stores the private key at the local end, and distributes the public key and a corresponding secret key ID to a terminal product;
the control equipment sends a key inquiry instruction and an authentication random number application to a terminal product;
the terminal product generates a random number, encrypts the random number by using a public key prestored at the local terminal to obtain first ciphertext data, and returns the first ciphertext data and the secret key ID to the control equipment;
the control equipment uploads the obtained first ciphertext data and the key ID to an encryption and decryption server;
the encryption and decryption server decrypts the first ciphertext data by adopting a private key corresponding to the secret key ID to obtain first plaintext data, encrypts the first plaintext data through the private key to form second ciphertext data, and sends the second ciphertext data to the control equipment;
the control equipment sends the second ciphertext data to the terminal product;
and the terminal product decrypts the second ciphertext data by using the public key prestored in the home terminal to obtain second plaintext data, compares the second plaintext data with the random number, and if the second plaintext data is equal to the random number, the authentication is determined to be successful, otherwise, the authentication is determined to be failed.
Optionally, before authenticating the control right validity of the control device, the method further includes the step of authenticating the device validity of the control device:
the control equipment collects self ID information, mixes the self ID information with pre-stored account information of an authentication server, forms a legal certificate application file through data encryption, and sends the legal certificate application file to the authentication server;
the authentication server checks the legal certificate application file, and issues the equipment legal certificate to the control equipment after the check is passed;
and controlling the equipment to install the equipment legal certificate to finish the authentication of the equipment legality.
Optionally, the ID information of the device itself includes a hardware ID, a network card address, and/or a bluetooth address; the equipment legal certificate comprises legal authentication duration, legal verification ciphertext information and legal identity ID information.
Optionally, after authenticating the device validity of the control device and before authenticating the control right validity of the control device, the authentication method further includes the step of the control device performing security authentication at an authentication server:
the control equipment logs in a Token server through an account and a password to perform equipment account authentication, and the Token server returns Token information to the control equipment, wherein the Token information comprises account expiration information and successful verification information;
and the authentication server completes further confirmation of the equipment validity of the control equipment according to the Token information and returns safety authentication result information to the control equipment.
A network device that functions as a control device, comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
sending a key inquiry command and an authentication random number application to a terminal product;
receiving first ciphertext data and a secret key ID returned by a terminal product, wherein the first ciphertext data is obtained by encrypting a generated random number by the terminal product by adopting a pre-stored public key;
uploading the obtained first ciphertext data and the key ID to an encryption and decryption server;
receiving second ciphertext data returned by the encryption and decryption server, wherein the second ciphertext data is formed by the encryption and decryption server firstly decrypting and then encrypting the first ciphertext data by adopting a private key corresponding to the secret key ID;
and sending the second ciphertext data to the terminal product, and finishing the authentication operation by the terminal product according to the second ciphertext data.
Optionally, the processor is further configured to:
collecting self ID information, mixing the self ID information with pre-stored account information of an authentication server, forming a legal certificate application file through data encryption, and sending the legal certificate application file to the authentication server;
receiving a device legal certificate issued by an authentication server;
and installing the equipment legal certificate.
Optionally, the processor is further configured to:
logging in a Token server to perform equipment account authentication, receiving Token information returned by the Token server and sending the Token information to an authentication server;
and receiving the safety authentication result information returned by the authentication server.
A network device as an end product, comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
applying for obtaining a public key and a corresponding secret key ID from an encryption and decryption server;
receiving a key inquiry command and an authentication random number application sent by control equipment;
generating a random number, encrypting the random number by using a public key prestored in the local terminal to obtain first ciphertext data, and returning the first ciphertext data and the secret key ID to the control equipment;
receiving second ciphertext data sent by the control equipment;
and decrypting the second ciphertext data by using the public key prestored in the local terminal to obtain second plaintext data, comparing the second plaintext data with the random number, and if the second plaintext data is equal to the random number, determining that the authentication is successful, and if not, determining that the authentication is failed.
A network device that functions as an encryption/decryption server, comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
generating a private key and a public key which are matched, storing the private key at a home terminal, and distributing the public key and a corresponding secret key ID to a terminal product;
receiving first ciphertext data and a secret key ID sent by control equipment; and decrypting the first ciphertext data by using a private key corresponding to the secret key ID to obtain first plaintext data, encrypting the first plaintext data by using the private key to form second ciphertext data, and sending the second ciphertext data to the control equipment.
A storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps of any of the above authentication methods.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
the embodiment of the invention adopts the encryption and decryption server to replace the traditional hardware encryption device to finish the encryption and decryption of the authentication data of the equipment, and defines a brand new authentication method between the control equipment and the terminal product, so that the application is not limited by regions, and the network can work in places with networks as long as the network can be legally authorized; moreover, the data encryption and decryption are all at the server side, and the server generally has good protection measures at present, so that the security is higher, the terminal product can be safely protected, and the change of the secret key is more flexible and convenient.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a method for authenticating device validity of a control device according to an embodiment of the present invention.
Fig. 2 is a flowchart of a method for performing security authentication on an authentication server by a control device according to an embodiment of the present invention.
Fig. 3 is a flowchart of a method for authenticating the control right validity of the control device according to the embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the embodiments of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention without any creative efforts shall fall within the protection scope of the embodiments of the present invention.
The terms "comprises" and "comprising," and any variations thereof, in the description and claims of embodiments of the present invention and the above-described drawings, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In view of the above-described problems, an embodiment of the present invention provides an authentication method, which mainly includes: the method comprises the steps of authenticating the equipment validity of the control equipment, performing safety authentication on the control equipment at an authentication server, and authenticating the control right validity of the control equipment.
Referring to fig. 1, in the embodiment of the present invention, the step of authenticating the device validity of the control device includes:
step 101: the control equipment collects the ID information of the control equipment, mixes the ID information of the control equipment with the account information of a pre-stored authentication server and forms a legal certificate application file through data encryption.
The self ID information comprises information such as hardware ID, network card address and/or Bluetooth address, and has uniqueness. The pre-stored account information of the authentication server comprises information such as a server address, an account password and the like.
Step 102: and the control equipment uploads the legal certificate application file to the authentication server through an Http protocol according to an uploading communication interface defined by the authentication server.
Step 103: and the authentication server verifies the information of the applicant and the application equipment according to the legal certificate application file, and generates an equipment legal certificate after the verification is passed.
Illustratively, the device certificate includes: the legal authentication duration, the legal verification ciphertext information and the legal identity ID information.
Step 104: and after the control equipment receives the equipment legal certificate, installing the equipment legal certificate, and thus finishing the equipment legality authentication of the control equipment.
Different from the traditional mode of 'the equipment legality authentication is carried out by connecting the hardware encryption module with the control equipment through legal authorization from the outside', the embodiment of the invention adopts the authentication server to realize the equipment legality authentication, and because the safety of the authentication server is controllable, illegal equipment can be effectively prevented from passing the equipment legality authentication, and the safety of terminal products is improved.
Referring to fig. 2, in the embodiment of the present invention, the step of the control device performing the security authentication on the authentication server includes:
step 201, on the basis of passing the device validity authentication, the control device logs in the Token server through the account and the password to perform the device account authentication, and the Token server returns Token information to the control device, wherein the Token information includes account expiration information and successful verification information.
Step 202, the authentication server completes the reconfirmation of the legality of the equipment of the control equipment according to the Token information so as to ensure that the legality of the equipment of the control equipment is still valid at present, and returns safety authentication result information to the control equipment.
In this step, if the authentication is passed, authentication success information including an authentication success identifier and management and control information is returned to the control device.
Note that the Token server and the authentication server in the present flow may be the same server or different servers, and are not limited.
Referring to fig. 3, in the embodiment of the present invention, the step of authenticating the control right validity of the control device includes:
step 301: the control equipment sends a key inquiry instruction to the terminal product, and the terminal product returns the key ID stored at the terminal product side to the control equipment through protocol data agreed with the equipment.
Wherein, the key ID refers to: the terminal defines the key identification in the development process, and the identification is distributed to the terminal product by the encryption and decryption server in advance and is integrated by the terminal product.
Before the process starts, the encryption and decryption server generates a matched private key and a public key, stores the private key at the local terminal, and distributes the public key and a corresponding secret key ID to a terminal product.
Step 302: the control equipment sends an authentication random number application to the terminal product; the terminal product generates a random number, encrypts the random number through a public key stored in an internal system of the terminal to obtain first ciphertext data and returns the first ciphertext data to the control equipment.
The random number may be defined as 16 bits, including letters, numbers, underlining, etc.
Step 303: the control equipment uploads the first ciphertext data, the key ID and the encryption and decryption type to the encryption and decryption server, the encryption and decryption server decrypts the first ciphertext data by adopting a private key corresponding to the key ID to obtain first plaintext data, encrypts the first plaintext data through the private key to form second ciphertext data, and sends the second ciphertext data to the control equipment.
Step 304: the control equipment sends the second ciphertext data generated by the encryption and decryption server to the terminal product again; and the terminal product decrypts the second ciphertext data by using the public key prestored in the local terminal to obtain second plaintext data, compares the second plaintext data with the random number generated in the step 302, if the second plaintext data is equal to the random number, the authentication is determined to be successful, the terminal product opens the data control channel for the control equipment, and if the second plaintext data is not equal to the random number, the authentication is determined to be failed, and the terminal product does not open the data control channel.
Different from the traditional control equipment which encrypts and decrypts data through a tool running in the control equipment, the embodiment of the invention adopts the encryption and decryption server to manage the public key and realize the encryption and decryption processing of the authentication data, thereby effectively achieving the aim of safely controlling a terminal product by legal equipment and preventing the terminal product from being illegally damaged in the market.
Based on the same technical concept, the embodiment of the invention also provides network equipment, which is used for realizing the method flow of the control equipment in the method embodiment. The network device includes: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
sending a key inquiry command and an authentication random number application to a terminal product;
receiving first ciphertext data and a secret key ID returned by a terminal product, wherein the first ciphertext data is obtained by encrypting a generated random number by the terminal product by adopting a pre-stored public key;
uploading the obtained first ciphertext data and the key ID to an encryption and decryption server;
receiving second ciphertext data returned by the encryption and decryption server, wherein the second ciphertext data is formed by the encryption and decryption server firstly decrypting and then encrypting the first ciphertext data by adopting a private key corresponding to the secret key ID;
and sending the second ciphertext data to the terminal product, and finishing the authentication operation by the terminal product according to the second ciphertext data.
In an alternative embodiment, the processor is further configured to: collecting self ID information, mixing the self ID information with pre-stored account information of an authentication server, forming a legal certificate application file through data encryption, and sending the legal certificate application file to the authentication server; receiving a device legal certificate issued by an authentication server; and installing the equipment legal certificate.
In yet another alternative embodiment, the processor is further configured to: logging in a Token server to perform equipment account authentication, receiving Token information returned by the Token server and sending the Token information to an authentication server; and receiving the safety authentication result information returned by the authentication server.
Based on the same technical concept, the embodiment of the invention also provides network equipment for realizing the method flow of the terminal product in the method embodiment. The network device includes: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
applying for obtaining a public key and a corresponding secret key ID from an encryption and decryption server;
receiving a key inquiry command and an authentication random number application sent by control equipment;
generating a random number, encrypting the random number by using a public key prestored in the local terminal to obtain first ciphertext data, and returning the first ciphertext data and the secret key ID to the control equipment;
receiving second ciphertext data sent by the control equipment;
and decrypting the second ciphertext data by using a public key prestored in the home terminal to obtain second plaintext data, comparing the second plaintext data with the random number, and if the second plaintext data is equal to the random number, determining that the authentication is successful, and otherwise, determining that the authentication is failed.
Based on the same technical concept, the embodiment of the invention also provides network equipment for realizing the method flow of the encryption and decryption server in the method embodiment. The network device includes: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
generating a matched private key and a public key, storing the private key at a local terminal, and distributing the public key and a corresponding key ID to a terminal product;
receiving first ciphertext data and a secret key ID sent by control equipment; and decrypting the first ciphertext data by using a private key corresponding to the secret key ID to obtain first plaintext data, encrypting the first plaintext data by using the private key to form second ciphertext data, and sending the second ciphertext data to the control equipment.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, the present invention provides a storage medium, in which a plurality of instructions are stored, and the instructions can be loaded by a processor to execute the steps in any one of the authentication methods provided by the embodiments of the present invention.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An authentication method, characterized in that the authentication method comprises the steps of authenticating the validity of the control right of a control device:
the encryption and decryption server generates a matched private key and a public key, stores the private key at the local end, and distributes the public key and a corresponding secret key ID to a terminal product;
the control equipment sends a key inquiry instruction and an authentication random number application to a terminal product;
the terminal product generates a random number, encrypts the random number by using a public key prestored at the local terminal to obtain first ciphertext data, and returns the first ciphertext data and the secret key ID to the control equipment;
the control equipment uploads the obtained first ciphertext data and the key ID to an encryption and decryption server;
the encryption and decryption server decrypts the first ciphertext data by adopting a private key corresponding to the secret key ID to obtain first plaintext data, encrypts the first plaintext data by the private key to form second ciphertext data, and sends the second ciphertext data to the control equipment;
the control equipment sends the second ciphertext data to the terminal product;
and the terminal product decrypts the second ciphertext data by using the public key prestored in the home terminal to obtain second plaintext data, compares the second plaintext data with the random number, and if the second plaintext data is equal to the random number, the authentication is determined to be successful, otherwise, the authentication is determined to be failed.
2. The authentication method according to claim 1, further comprising, before authenticating the control right validity of the control device, the step of authenticating the device validity of the control device:
the control equipment collects self ID information, mixes the self ID information with pre-stored account information of an authentication server, forms a legal certificate application file through data encryption, and sends the legal certificate application file to the authentication server;
the authentication server checks the legal certificate application file, and issues the equipment legal certificate to the control equipment after the check is passed;
and controlling the equipment to install the equipment legal certificate to finish the authentication of the equipment legality.
3. The authentication method according to claim 2, wherein the self ID information includes a hardware ID, a network card address and/or a bluetooth address; the equipment legal certificate comprises legal authentication duration, legal verification ciphertext information and legal identity ID information.
4. The authentication method according to claim 2, wherein after authenticating the device legitimacy of the control device and before authenticating the control right legitimacy of the control device, the authentication method further comprises a step of the control device performing security authentication at an authentication server:
the control equipment logs in a Token server through an account and a password to perform equipment account authentication, and the Token server returns Token information to the control equipment, wherein the Token information comprises account expiration information and successful verification information;
and the authentication server completes further confirmation of the equipment validity of the control equipment according to the Token information and returns safety authentication result information to the control equipment.
5. A network device that functions as a control device, characterized by comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
sending a key inquiry command and an authentication random number application to a terminal product;
receiving first ciphertext data and a secret key ID returned by a terminal product, wherein the first ciphertext data is obtained by encrypting a generated random number by the terminal product by adopting a pre-stored public key;
uploading the obtained first ciphertext data and the key ID to an encryption and decryption server;
receiving second ciphertext data returned by the encryption and decryption server, wherein the second ciphertext data is formed by the encryption and decryption server firstly decrypting and then encrypting the first ciphertext data by adopting a private key corresponding to the secret key ID;
and sending the second ciphertext data to the terminal product, and finishing the authentication operation by the terminal product according to the second ciphertext data.
6. The network device of claim 5, wherein the processor is further configured to:
collecting self ID information, mixing the self ID information with pre-stored account information of an authentication server, forming a legal certificate application file through data encryption, and sending the legal certificate application file to the authentication server;
receiving a device legal certificate issued by an authentication server;
and installing the equipment legal certificate.
7. The network device of claim 5, wherein the processor is further configured to:
logging in a Token server to perform equipment account authentication, receiving Token information returned by the Token server and sending the Token information to an authentication server;
and receiving the safety authentication result information returned by the authentication server.
8. A network device as an end product, comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
applying for obtaining a public key and a corresponding secret key ID from an encryption and decryption server;
receiving a key inquiry command and an authentication random number application sent by control equipment;
generating a random number, encrypting the random number by using a public key prestored in the local terminal to obtain first ciphertext data, and returning the first ciphertext data and the secret key ID to the control equipment;
receiving second ciphertext data sent by the control equipment;
and decrypting the second ciphertext data by using the public key prestored in the local terminal to obtain second plaintext data, comparing the second plaintext data with the random number, and if the second plaintext data is equal to the random number, determining that the authentication is successful, and if not, determining that the authentication is failed.
9. A network device that functions as an encryption/decryption server, comprising: a processor, and a memory and transceiver connected to the processor;
the processor is used for reading a computer program stored in the memory in advance and executing:
generating a matched private key and a public key, storing the private key at a local terminal, and distributing the public key and a corresponding key ID to a terminal product;
receiving first ciphertext data and a secret key ID sent by control equipment; and decrypting the first ciphertext data by using a private key corresponding to the secret key ID to obtain first plaintext data, encrypting the first plaintext data by using the private key to form second ciphertext data, and sending the second ciphertext data to the control equipment.
10. A storage medium storing instructions adapted to be loaded by a processor to perform the steps of the authentication method according to any one of claims 1 to 4.
CN202210762998.3A 2022-06-30 2022-06-30 Authentication method and equipment and storage medium Active CN115051871B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210762998.3A CN115051871B (en) 2022-06-30 2022-06-30 Authentication method and equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210762998.3A CN115051871B (en) 2022-06-30 2022-06-30 Authentication method and equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115051871A true CN115051871A (en) 2022-09-13
CN115051871B CN115051871B (en) 2024-07-30

Family

ID=83164502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210762998.3A Active CN115051871B (en) 2022-06-30 2022-06-30 Authentication method and equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115051871B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138809A (en) * 2021-04-30 2021-07-20 广东天波信息技术股份有限公司 Method and system for safely switching working modes of terminal

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220303A (en) * 2013-05-06 2013-07-24 华为软件技术有限公司 Server login method, server and authentication equipment
CN105959189A (en) * 2016-06-08 2016-09-21 美的集团股份有限公司 Home appliance equipment, communication system and method of cloud server and terminal, and terminal
CN108111497A (en) * 2017-12-14 2018-06-01 深圳市共进电子股份有限公司 Video camera and server inter-authentication method and device
CN109039628A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
CN109088889A (en) * 2018-10-16 2018-12-25 深信服科技股份有限公司 A kind of SSL encipher-decipher method, system and computer readable storage medium
WO2020134635A1 (en) * 2018-12-28 2020-07-02 百富计算机技术(深圳)有限公司 Pos terminal certificate update method, server, and pos terminal
CN113489585A (en) * 2021-07-02 2021-10-08 北京明朝万达科技股份有限公司 Identity authentication method and system of terminal equipment, storage medium and electronic equipment
CN114048438A (en) * 2021-11-10 2022-02-15 广州歌神信息科技有限公司 Equipment authentication method and device, equipment, medium and product thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220303A (en) * 2013-05-06 2013-07-24 华为软件技术有限公司 Server login method, server and authentication equipment
CN105959189A (en) * 2016-06-08 2016-09-21 美的集团股份有限公司 Home appliance equipment, communication system and method of cloud server and terminal, and terminal
CN108111497A (en) * 2017-12-14 2018-06-01 深圳市共进电子股份有限公司 Video camera and server inter-authentication method and device
CN109088889A (en) * 2018-10-16 2018-12-25 深信服科技股份有限公司 A kind of SSL encipher-decipher method, system and computer readable storage medium
CN109039628A (en) * 2018-11-02 2018-12-18 美的集团股份有限公司 Cryptographic key negotiation method, Cloud Server, equipment, storage medium and system
WO2020134635A1 (en) * 2018-12-28 2020-07-02 百富计算机技术(深圳)有限公司 Pos terminal certificate update method, server, and pos terminal
CN113489585A (en) * 2021-07-02 2021-10-08 北京明朝万达科技股份有限公司 Identity authentication method and system of terminal equipment, storage medium and electronic equipment
CN114048438A (en) * 2021-11-10 2022-02-15 广州歌神信息科技有限公司 Equipment authentication method and device, equipment, medium and product thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138809A (en) * 2021-04-30 2021-07-20 广东天波信息技术股份有限公司 Method and system for safely switching working modes of terminal

Also Published As

Publication number Publication date
CN115051871B (en) 2024-07-30

Similar Documents

Publication Publication Date Title
CN102217277B (en) Method and system for token-based authentication
US7975312B2 (en) Token passing technique for media playback devices
US8683562B2 (en) Secure authentication using one-time passwords
EP1500226B1 (en) System and method for storage and retrieval of a cryptographic secret from a plurality of network enabled clients
US8306228B2 (en) Universal secure messaging for cryptographic modules
CN101872399B (en) Dynamic digital copyright protection method based on dual identity authentication
US7640430B2 (en) System and method for achieving machine authentication without maintaining additional credentials
CN106888084B (en) Quantum fort machine system and authentication method thereof
US8214884B2 (en) Computer-based dynamic secure non-cached delivery of security credentials such as digitally signed certificates or keys
JP5284989B2 (en) Software license renewal
JP4095051B2 (en) Home network device capable of automatic ownership authentication, home network system and method thereof
US20040088541A1 (en) Digital-rights management system
US20110314288A1 (en) Circuit, system, device and method of authenticating a communication session and encrypting data thereof
CN103067333A (en) Method for verifying set top box access identity and authentication server
CN105743638A (en) System client authorization authentication method based on B/S framework
US20090119505A1 (en) Transaction method and verification method
CN108768941B (en) Method and device for remotely unlocking safety equipment
JP4226582B2 (en) Data update system
CN115051871B (en) Authentication method and equipment and storage medium
KR101996317B1 (en) Block chain based user authentication system using authentication variable and method thereof
KR101771484B1 (en) Creation Method of Signature Key to use Security Token efficiently
TWI725623B (en) Point-to-point authority management method based on manager's self-issued tickets
CN114301634A (en) Oauth protocol-based portal system user sharing method
CN111246480A (en) Application communication method, system, equipment and storage medium based on SIM card
KR100930012B1 (en) Method for Processing User's Certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant