CN115643027A - Identity authentication method and system based on STC single-chip microcomputer - Google Patents

Identity authentication method and system based on STC single-chip microcomputer Download PDF

Info

Publication number
CN115643027A
CN115643027A CN202211264891.2A CN202211264891A CN115643027A CN 115643027 A CN115643027 A CN 115643027A CN 202211264891 A CN202211264891 A CN 202211264891A CN 115643027 A CN115643027 A CN 115643027A
Authority
CN
China
Prior art keywords
computer
token
keya
authentication
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211264891.2A
Other languages
Chinese (zh)
Inventor
夏鑫航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Xinan Integrated Circuit Design Co ltd
Original Assignee
Jiangsu Xinan Integrated Circuit Design Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Xinan Integrated Circuit Design Co ltd filed Critical Jiangsu Xinan Integrated Circuit Design Co ltd
Priority to CN202211264891.2A priority Critical patent/CN115643027A/en
Publication of CN115643027A publication Critical patent/CN115643027A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of information security, and discloses an identity authentication method based on an STC single chip microcomputer, which comprises the following steps: the ith authentication device decrypts Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the ith authentication device, executes the program, and sends a token T to the computer after the program detects connection with the computer; the computer receives the token T, reads the ID number of the ith authentication device, decrypts the T by using KeyB to obtain (i | RNG | j), and retrieves the ID, T and UpdatePin stored in the computer according to i; the computer updates the token T to the Prog _ KeyA (i) according to the received token T and the read ID number; determining a token T received by the computer according to the validity of the ith authentication device; the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer to determine whether the authentication is successful. The identity authentication method and system based on the STC single chip microcomputer provided by the invention meet the requirements of low cost and high safety identity authentication.

Description

Identity authentication method and system based on STC single-chip microcomputer
Technical Field
The invention relates to the technical field of information security, in particular to an identity authentication method and system based on an STC single chip microcomputer.
Background
Identity authentication techniques are used in computer systems to confirm whether the identity of an operator is legitimate. Common methods include PIN code comparison, cryptography-based authentication methods, and biometric-based authentication methods. The existing authentication device, such as a U-shield for authenticating the identity of a user in an internet bank, uses an authentication mode based on a PK (public key information structure) system, generally uses a hardware mode to realize a public key cryptographic algorithm in the authentication device, and adopts a secure memory to store a secret key, so that the requirement on the authentication device is high, the cost is high, and the authentication device is not suitable for large-scale application occasions with lower security level.
Disclosure of Invention
The invention provides an identity authentication method and system based on an STC single chip microcomputer, which meet the requirements of low cost and high safety identity authentication.
The invention provides an identity authentication method based on an STC single chip microcomputer, which comprises the following steps:
the ith authentication device decrypts Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the ith authentication device, executes the program, and sends a token T to the computer after the program detects connection with the computer; where KeyA (i) is a key loaded by the i-th authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
the computer receives the token T, reads the ID number of the ith authentication device, decrypts the T by using KeyB to obtain (i | RNG | j), and searches the ID, T and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
the computer updates the token T to the Prog _ KeyA (i) according to the received token T and the read ID number;
determining a token T received by the computer according to the validity of the ith authentication device;
the computer compares the received token T value with a token T value temporarily stored in the computer to determine whether the authentication is successful.
Furthermore, the i-th authentication apparatus decrypts Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the i-th authentication apparatus, executes the program, and further includes, before the step of sending T to the computer after detecting the connection with the computer:
setting the count value j of the ith authentication device to 0, and reading the unique ID number of the ith authentication device by the computer to generate RNG, keyA (i), T and UpdatePin; wherein RNG is a random number, T is a token;
the computer saves the ID number, T and UpdatePin, writes KeyA (i) and Prog _ KeyA (i) into the ith authentication device, and sets the password required by the next updating program; the KeyA (i) is stored in a secure location of the authentication device, and is unreadable and not modifiable.
Further, the computer updates the token T to Prog _ KeyA (i) according to the received token T and the read ID number, including:
the computer compares whether the read ID number is consistent with the stored ID number;
if the ID number read by the computer is inconsistent with the stored ID number, the authentication fails;
if the computer compares that the read ID number is consistent with the stored ID number, the computer compares whether the received token T is consistent with the stored token T;
if the received token T is inconsistent with the stored token T by the computer, the authentication is failed;
if the computer compares that the received token T is consistent with the stored token T, j = j +1, a new RNG is generated, the token T is recalculated and temporarily stored, the token T is updated to Prog _ KeyA (i), and the Prog _ KeyA (i) is burned to the ith authentication device by using UpdatePin.
Further, the step of determining the token T received by the computer according to the validity of the ith authentication device includes:
if the ith authentication device is illegal, the key KeyA (i) does not exist, the Prog _ KeyA (i) cannot run, the computer cannot receive T, and the authentication fails;
if the ith authentication device is legal, the key KeyA (i) is possessed, the Prog _ KeyA (i) is decrypted by the ith authentication device to obtain an executable program, the executable program is stored in a program storage area of the ith authentication device, and the ith authentication device runs the decrypted program Prog _ KeyA (i) and returns to the T computer.
Further, the step of the computer comparing whether the received token T value and the token T value temporarily stored in the computer are consistent to determine whether the authentication is successful includes:
the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer;
if the received token T value is inconsistent with the token T value temporarily stored in the computer, the authentication is failed;
and if the received token T value is consistent with the token T value temporarily stored in the computer, the computer stores the temporarily stored T to the position corresponding to the index i, and the authentication is successful.
The invention also provides an identity authentication system based on the STC single chip microcomputer, which comprises:
a sending module, which is used for the ith authentication device to decrypt the Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, store the executable program in a program storage area of the ith authentication device, execute the program, and send a token T to the computer after the program detects the connection with the computer; where KeyA (i) is a key loaded by the i-th authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
the reading module is used for receiving the token T by the computer, reading the ID number of the ith authentication device, decrypting the T by using KeyB to obtain (i | RNG | j), and retrieving the ID, T and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
an updating module for the computer to update the token T to the Prog _ KeyA (i) according to the received token T and the read ID number;
the determining module is used for determining the token T received by the computer according to the legality of the ith authentication device;
and the authentication module is used for comparing whether the received token T value is consistent with the token T value temporarily stored in the computer or not by the computer so as to determine whether the authentication is successful or not.
The invention also provides a computer device comprising a memory and a processor, wherein the memory stores a computer program and the processor implements the steps of the method when executing the computer program.
The invention also provides a computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
The beneficial effects of the invention are as follows:
1. and the functions of safe storage of the program decryption key and the like are realized on the basis of the STC chip, and the safety is independently controllable.
2. The authentication apparatus does not store the data encryption key KeyB.
3. Each authentication device has a unique ID number, and the ID numbers are compared and checked during authentication, so that the counterfeiting difficulty of an attacker is increased.
4. The number of authentication times of each authentication device is counted up, and the exhaustive attack can be resisted.
5. The token T transmitted in each authentication is different, and the anti-attack performance is enhanced.
6. The identity authentication method is based on the single chip microcomputer, so that other functions such as man-machine interaction and the like are conveniently expanded, and the cost of the device is reduced.
Drawings
Fig. 1 is a schematic flow chart of a method according to an embodiment of the present invention.
Fig. 2 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of an internal structure of a computer device according to an embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention utilizes the 'non-repeated serial number ID' and the 'transmission after file encryption' function of the STC15 series single chip microcomputer, and each chip of the STC15 series single chip microcomputer is provided with the non-repeated serial number ID, thereby being used for the functions of identity identification and anti-counterfeiting. The basic steps and functions of "file transmission after encryption" are described as follows:
1. under the safe environment when the singlechip is burned for the first time, a computer (burner) generates a secret key, transmits the secret key to the singlechip and stores the secret key in a safe position, and then the secret key can not be changed or read in the singlechip.
2. The computer encrypts the program to be burned by using the secret key and transmits the encrypted program to the single chip microcomputer.
3. The singlechip automatically uses the key stored inside to decrypt and stores the decrypted program into a program storage area.
4. If the decryption key in the singlechip is consistent with the encryption key in the computer, the decrypted program in the singlechip can normally run, otherwise, the program cannot normally run.
In the present invention, the relevant definitions are as follows:
KeyA (i) is the key used to encrypt the burn program. And each authentication device loads one key before the program is burned for the first time, and the key loaded by the ith authentication device is recorded in the computer as KeyA (i).
Prog _ KeyA (i): the encrypted program using KeyA (i) contains the token T.
i: number of KeyA (i).
And KeyB: the group key is formed by grouping a certain number of authentication devices according to the application properties and scale, and the group key KeyB is distributed and recorded in the computer.
j: the count value, the value of j, increases by 1 each time the authentication device is used.
ID: a unique serial number of the authentication device.
RNG: random numbers, generated by a computer.
T: the token is the result of an encryption operation performed on (i | RNG | j) by KeyB. Where | represents a binary concatenation operation, for example: 100 wt 1111=1001111.
An authentication device: the miniature electronic system for realizing the authentication method based on the STC encryption singlechip.
UpdatePin: and (3) updating a program password, and setting a special function of the STC singlechip, wherein the password needs to be verified when the program is updated next time.
As shown in fig. 1, the present invention provides an identity authentication method based on an STC single chip, which comprises:
step S1 comprises, before:
s01, setting the count value j of the ith authentication device to 0, and reading the unique ID number of the ith authentication device by the computer to generate RNG, keyA (i), T and UpdatePin; wherein RNG is a random number, T is a token;
s02, the computer saves the ID number, the T and the UpdatePin, writes KeyA (i) and Prog _ KeyA (i) into the ith authentication device, and sets 'the password required by the next updating program'; the KeyA (i) is stored in a secure location of the authentication device, and is unreadable and not modifiable.
S1, the ith authentication device decrypts Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the ith authentication device, executes the program, and sends a token T to the computer after the program detects connection with the computer; where KeyA (i) is a key loaded on the ith authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
s2, the computer receives the token T, reads the ID number of the ith authentication device, decrypts the T by using KeyB to obtain (i | RNG | j), and searches the ID, T and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
s3, the computer updates the token T to Prog _ KeyA (i) according to the received token T and the read ID number;
step S3 specifically includes:
s31, comparing whether the read ID number is consistent with the stored ID number or not by the computer;
s32, if the ID number read by the computer is not consistent with the stored ID number, the authentication fails, and the process is ended;
s33, if the ID number read by the computer is consistent with the stored ID number, the computer compares whether the received token T is consistent with the stored token T;
s34, if the received token T is not consistent with the stored token T by the computer, the authentication fails, and the process is ended;
and S35, if the received token T is consistent with the stored token T by comparing the computer, j = j +1, generating a new RNG, recalculating the token T, temporarily storing the token T, updating the token T into Prog _ KeyA (i), and burning the Prog _ KeyA (i) into the ith authentication device by using UpdatePin.
S4, determining a token T received by the computer according to the validity of the ith authentication device;
step S4 specifically includes:
s41, if the ith authentication device is illegal, no key KeyA (i) exists, the Prog _ KeyA (i) cannot run, the computer cannot receive T, the authentication fails, and the process is ended;
s42, if the ith authentication device is legal, the key KeyA (i) is possessed, the ith authentication device decrypts the Prog _ KeyA (i) to obtain an executable program, the executable program is stored in a program storage area of the ith authentication device, the ith authentication device runs the decrypted program Prog _ KeyA (i), and the program is returned to the computer;
and S5, the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer to determine whether the authentication is successful.
Step S5 specifically includes:
s51, the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer;
s52, if the received token T value is inconsistent with the token T value temporarily stored in the computer, the authentication fails, and the process is ended;
s53, if the received token T value is consistent with the token T value temporarily stored in the computer, the computer stores the temporarily stored T to the position corresponding to the index i, the authentication is successful, and the process is ended.
Because the STC15 series single chip microcomputer does not need external crystal oscillator and reset, and the flash, the EEPROM and the SRAM are arranged in the single chip microcomputer, a single chip microcomputer minimum system can be realized. The authentication device can be a minimum system taking an STC15 series low-cost single chip microcomputer as a core, and can also be added with peripheral devices such as keys, displays, sounds and the like for human-computer interaction according to application requirements. The related technology is common knowledge of the technicians in the field and is not described in detail.
As shown in fig. 2, the present invention further provides an identity authentication system based on the STC single chip microcomputer, including:
a sending module 1, configured to decrypt Prog _ KeyA (i) by using KeyA (i) by the ith authentication apparatus to obtain an executable program, store the executable program in a program storage area of the ith authentication apparatus, execute the program, and send a token T to the computer after the program detects a connection with the computer; where KeyA (i) is a key loaded on the ith authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
a reading module 2, configured to receive the token T by the computer, read the ID number of the i-th authentication device, decrypt T using KeyB to obtain (i | RNG | j), and retrieve the ID, T, and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
an updating module 3, which is used for the computer to update the token T to Prog _ KeyA (i) according to the received token T and the read ID number;
the determining module 4 is used for determining the token T received by the computer according to the legality of the ith authentication device;
and the authentication module 5 is used for comparing whether the received token T value is consistent with the token T value temporarily stored in the computer by the computer so as to determine whether the authentication is successful.
In one embodiment, further comprising:
the initialization module is used for setting the count value j of the ith authentication device to 0, and the computer reads the unique ID number of the ith authentication device to generate RNG, keyA (i), T and UpdatePin; wherein RNG is a random number, T is a token;
the storage module is used for storing the ID number, the T and the UpdatePin by the computer, writing KeyA (i) and Prog _ KeyA (i) into the ith authentication device and setting the password required by the next updating program; the KeyA (i) is stored in a secure location of the authentication device, and is unreadable and not modifiable.
In one embodiment, the update module 3 includes:
a first comparing unit for comparing whether the read ID number is consistent with the stored ID number by the computer;
the first authentication unit is used for failing authentication when the read ID number and the stored ID number are inconsistent by the computer comparison;
the second comparing unit is used for comparing whether the received token T is consistent with the stored token T or not when the read ID number is consistent with the stored ID number by the computer;
the second authentication unit is used for failing authentication when the received token T and the stored token T are inconsistent by the computer comparison;
and the generating unit is used for generating a new RNG when the received token T is compared with the stored token T by the computer, wherein j = j +1, recalculating the token T, temporarily storing the token T, updating the token T to the Prog _ KeyA (i), and burning the Prog _ KeyA (i) to the ith authentication device by using the UpdatePin.
In one embodiment, the determination module 4 includes:
a third authentication unit, configured to, when the ith authentication apparatus is illegal, fail to operate without the key KeyA (i), and fail to receive T if the computer fails to receive T;
and a returning unit, configured to, when the ith authentication apparatus is legitimate, possess the key KeyA (i), decrypt the Prog _ KeyA (i) by the ith authentication apparatus to obtain the executable program, store the executable program in the program storage area of the ith authentication apparatus, run the decrypted program Prog _ KeyA (i) by the ith authentication apparatus, and return T to the computer.
In one embodiment, the authentication module 5 includes:
the comparison unit is used for comparing whether the received token T value is consistent with the token T value temporarily stored in the computer or not by the computer;
a fourth authentication unit for failing authentication when the received token T value is inconsistent with the token T value temporarily stored in the computer;
and the fifth authentication unit is used for storing the temporarily stored T to the position corresponding to the index i by the computer when the received token T value is consistent with the token T value temporarily stored in the computer, and the authentication is successful.
The modules and units are used for correspondingly executing the steps in the identity authentication method based on the STC single chip microcomputer, and specific implementation manners of the modules and units are described with reference to the method embodiments and are not described herein again.
As shown in fig. 3, the present invention further provides a computer device, which may be a server, and the internal structure of the computer device may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the computer designed processor is used to provide computational and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The memory provides an environment for the operating system and the running of computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing all data required by the identity authentication method based on the STC single chip microcomputer. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize the identity authentication method based on the STC single chip microcomputer.
It will be understood by those skilled in the art that the structure shown in fig. 3 is only a block diagram of a part of the structure related to the present application, and does not constitute a limitation to the computer device to which the present application is applied.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the method for authenticating an identity based on an STC single chip microcomputer is implemented.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware related to instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (SSRDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct bused dynamic RAM (DRDRAM), and bused dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one of 8230, and" comprising 8230does not exclude the presence of additional like elements in a process, apparatus, article, or method comprising the element.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all equivalent structures or equivalent processes performed by the present invention or directly or indirectly applied to other related technical fields will be covered by the scope of the present invention.

Claims (8)

1. An identity authentication method based on an STC single chip microcomputer is characterized by comprising the following steps:
the ith authentication device decrypts Prog _ KeyA (i) by using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the ith authentication device, executes the program, and sends a token T to the computer after the program detects connection with the computer; where KeyA (i) is a key loaded by the i-th authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
the computer receives the token T, reads the ID number of the ith authentication device, decrypts the T by using KeyB to obtain (i | RNG | j), and searches the ID, T and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
the computer updates the token T to Prog _ KeyA (i) according to the received token T and the read ID number;
determining a token T received by the computer according to the validity of the ith authentication device;
the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer to determine whether the authentication is successful.
2. The STC single chip microcomputer based identity authentication method of claim 1, wherein the i-th authentication apparatus decrypts Prog _ KeyA (i) using KeyA (i) to obtain an executable program, stores the executable program in a program storage area of the i-th authentication apparatus, and executes the program, and after detecting the connection with the computer, before the step of sending T to the computer, the method further comprises:
setting the count value j of the ith authentication device to 0, reading the unique ID number of the ith authentication device by the computer to generate RNG, keyA (i), T and UpdatePin; wherein RNG is a random number, T is a token;
the computer saves the ID number, T and UpdatePin, writes KeyA (i) and Prog _ KeyA (i) into the ith authentication device, and sets the password required by the next updating program; the KeyA (i) is stored in a secure location of the authentication device, and is unreadable and not modifiable.
3. The STC singlechip-based identity authentication method according to claim 2, wherein the computer updates the token T to Prog _ KeyA (i) according to the received token T and the read ID number, and comprises:
the computer compares whether the read ID number is consistent with the stored ID number;
if the ID number read by the computer is inconsistent with the stored ID number, the authentication fails;
if the computer compares that the read ID number is consistent with the stored ID number, the computer compares whether the received token T is consistent with the stored token T;
if the received token T is inconsistent with the stored token T by the computer, the authentication is failed;
if the computer compares that the received token T is consistent with the stored token T, j = j +1, a new RNG is generated, the token T is recalculated and temporarily stored, the token T is updated to Prog _ KeyA (i), and the Prog _ KeyA (i) is burned to the ith authentication device by using UpdatePin.
4. The STC single chip microcomputer based identity authentication method of claim 3, wherein the step of determining the token T received by the computer according to the validity of the i-th authentication device comprises:
if the ith authentication device is illegal, the key KeyA (i) does not exist, the Prog _ KeyA (i) cannot run, the computer cannot receive T, and the authentication fails;
if the ith authentication device is legal, the key KeyA (i) is possessed, the ith authentication device decrypts the Prog _ KeyA (i) to obtain an executable program, the executable program is stored in a program storage area of the ith authentication device, and the ith authentication device runs the decrypted program Prog _ KeyA (i) and returns to the T computer.
5. The STC single chip microcomputer-based identity authentication method of claim 4, wherein the step of the computer comparing whether the received token T value is consistent with the token T value temporarily stored in the computer to determine whether the authentication is successful comprises:
the computer compares whether the received token T value is consistent with the token T value temporarily stored in the computer;
if the received token T value is inconsistent with the token T value temporarily stored in the computer, the authentication is failed;
and if the received token T value is consistent with the token T value temporarily stored in the computer, the computer stores the temporarily stored T to the position corresponding to the index i, and the authentication is successful.
6. An identity authentication system based on an STC single chip microcomputer is characterized by comprising:
a sending module, configured to decrypt the Prog _ KeyA (i) by using KeyA (i) by the ith authentication apparatus to obtain an executable program, store the executable program in the program storage area of the ith authentication apparatus, execute the program, and send a token T to the computer after the program detects a connection with the computer; where KeyA (i) is a key loaded by the i-th authentication apparatus, prog _ KeyA (i) is a program encrypted using KeyA (i), and includes a token T;
the reading module is used for receiving the token T by the computer, reading the ID number of the ith authentication device, decrypting the T by using KeyB to obtain (i | RNG | j), and retrieving the ID, T and UpdatePin stored in the computer according to i; wherein UpdatePin is an updating program password; wherein, | represents a binary concatenation operation, keyB is a group key, a set number of authentication devices are grouped into one group, the group key KeyB is distributed, and recorded in the computer;
an updating module for the computer to update the token T to Prog _ KeyA (i) according to the received token T and the read ID number;
the determining module is used for determining the token T received by the computer according to the legality of the ith authentication device;
and the authentication module is used for comparing whether the received token T value is consistent with the token T value temporarily stored in the computer or not by the computer so as to determine whether the authentication is successful or not.
7. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN202211264891.2A 2022-10-17 2022-10-17 Identity authentication method and system based on STC single-chip microcomputer Pending CN115643027A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211264891.2A CN115643027A (en) 2022-10-17 2022-10-17 Identity authentication method and system based on STC single-chip microcomputer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211264891.2A CN115643027A (en) 2022-10-17 2022-10-17 Identity authentication method and system based on STC single-chip microcomputer

Publications (1)

Publication Number Publication Date
CN115643027A true CN115643027A (en) 2023-01-24

Family

ID=84944203

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211264891.2A Pending CN115643027A (en) 2022-10-17 2022-10-17 Identity authentication method and system based on STC single-chip microcomputer

Country Status (1)

Country Link
CN (1) CN115643027A (en)

Similar Documents

Publication Publication Date Title
US7043636B2 (en) Data integrity mechanisms for static and dynamic data
CN104104517B (en) The method and system of disposal password checking
CN101272237B (en) Method and system for automatically generating and filling login information
CN102422296B (en) Method for authenticating access to a secured chip by a test device
US20040255119A1 (en) Memory device and passcode generator
KR100702499B1 (en) System and method for guaranteeing software integrity
US20050076226A1 (en) Computing device that securely runs authorized software
US20200272745A1 (en) Security Data Processing Device
KR20090007123A (en) Secure boot method and semiconductor memory system for using the method
CN111680305A (en) Data processing method, device and equipment based on block chain
CN105518687A (en) Secure data storage
JPH11306088A (en) Ic card and ic card system
CN104683354A (en) Dynamic password system based on label
JP2009151528A (en) Ic card storing biological information and access control method thereof
US20120096280A1 (en) Secured storage device with two-stage symmetric-key algorithm
JP6387908B2 (en) Authentication system
CN112653553B (en) Internet of things equipment identity management system
WO2009129017A1 (en) Methods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor
EP3214567B1 (en) Secure external update of memory content for a certain system on chip
CN103544511A (en) Anti-counterfeiting identification
CN112613033A (en) Method and device for safely calling executable file
CN112417422A (en) Security chip upgrading method and computer readable storage medium
CN103370718A (en) Data protection using distributed security key
CN109302442B (en) Data storage proving method and related equipment
US20060075254A1 (en) Smart card functionality from a security co-processor and symmetric key in ROM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination