CN117424703A - Secure communication method and platform - Google Patents

Secure communication method and platform Download PDF

Info

Publication number
CN117424703A
CN117424703A CN202311511879.1A CN202311511879A CN117424703A CN 117424703 A CN117424703 A CN 117424703A CN 202311511879 A CN202311511879 A CN 202311511879A CN 117424703 A CN117424703 A CN 117424703A
Authority
CN
China
Prior art keywords
authentication
mobile terminal
key
intelligent mobile
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311511879.1A
Other languages
Chinese (zh)
Inventor
赵剑娇
覃杰
覃刚
杨萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qingyuan Bochuang Technology Co ltd
Original Assignee
Beijing Qingyuan Bochuang Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qingyuan Bochuang Technology Co ltd filed Critical Beijing Qingyuan Bochuang Technology Co ltd
Priority to CN202311511879.1A priority Critical patent/CN117424703A/en
Publication of CN117424703A publication Critical patent/CN117424703A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys

Abstract

The invention is applicable to the technical field of secure communication, and provides a secure communication method and a platform, wherein an intelligent mobile terminal receives an issuing instruction and records the instruction issuing time of the issuing instruction; the intelligent mobile terminal and the wearable device respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time; the wearable device compares the first authentication key with the second authentication key; and when the wearable device determines that the first authentication key and the second authentication key are different, generating authentication failure information. When a secure communication channel is established between the intelligent mobile terminal and the wearable device, authentication keys generated by both parties can have instantaneity and randomness, so that the authentication keys cannot be obtained by external devices and personnel in a cracking way before specific contents are determined, and the generation rule of the authentication keys is difficult to obtain by the external devices and the personnel, thereby greatly improving the security degree of the communication channel established by the secure communication method.

Description

Secure communication method and platform
Technical Field
The invention belongs to the technical field of secure communication, and particularly relates to a secure communication method and a platform.
Background
Along with the development of intelligent mobile scientific and technological equipment, more and more wearable equipment is integrated into the life of people, the wearable equipment has the characteristics of being capable of calculating and moving, intelligence and interconnection, along with the rapid popularization of mobile Internet and the wide application of the Internet of things technology, the wearable equipment is accompanied with the daily life, intelligent families, medical care and body-building exercises of people, at present, the wearable equipment is in the form of portable accessories which are provided with partial calculation functions, connectable mobile phones and various terminals, and communication with the wearable equipment is established through APP by installing client APP corresponding to the wearable equipment on other terminal equipment (intelligent mobile phones) of users.
In the use process of the intelligent mobile terminal and the wearable device, a large amount of data information is transmitted between the intelligent mobile terminal and the wearable device, wherein the data information comprises health information, life preference information, identity information, action tracks and the like of a user, so that the user privacy is compromised for avoiding leakage of the data information, and the data information is very important for establishing a safe communication environment between the wearable device and the intelligent mobile terminal.
At present, when a secure communication channel between the wearable device and the intelligent mobile terminal is established, a bidirectional authentication mode is adopted to ensure that the intelligent mobile terminal and the wearable device are in a secure communication environment, but authentication keys adopted by both the intelligent mobile terminal and the wearable device are generally unchanged or the change mode of the authentication keys is regular, so that illegal intrusion devices or personnel can establish an illegal communication channel through illegal intrusion of the intelligent mobile terminal and the wearable device, and the security degree is not high enough.
Disclosure of Invention
The invention aims to provide a secure communication method and a platform, and aims to solve the problems in the background technology.
The present invention is thus embodied, a secure communication method, the method comprising:
the intelligent mobile terminal receives the issuing instruction and records the instruction issuing time of the issuing instruction;
the intelligent mobile terminal and the wearable device respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time;
the wearable device compares the first authentication key with the second authentication key;
when the wearable device determines that the first authentication secret key and the second authentication secret key are different, generating verification failure information, and sending the verification failure information to the intelligent mobile terminal;
when the wearable device determines that the first authentication secret key is the same as the second authentication secret key, generating two-way authentication passing information, and sending the two-way authentication passing information to the intelligent mobile terminal;
the intelligent mobile terminal analyzes the bidirectional authentication passing information and judges whether a secure communication channel is established with the wearable equipment.
As a further limitation of the technical solution of the embodiment of the present invention, the steps of receiving the issuing instruction by the intelligent mobile terminal and recording the instruction issuing time of the issuing instruction include:
The intelligent mobile terminal receives the issuing instruction and analyzes whether the issuing instruction needs to be sent to the wearable equipment or not;
if the intelligent mobile terminal determines that the issuing instruction needs to be sent to the wearable equipment, the instruction issuing time of the issuing instruction is recorded.
As a further limitation of the technical scheme of the embodiment of the invention, a first data model and a second data model are respectively set in the intelligent mobile terminal and the wearable device, the first data model and the second data model both store the same ciphertext table, the ciphertext table comprises a plurality of preset instruction issuing time and a plurality of authentication secret keys, and each preset instruction issuing time corresponds to a unique authentication secret key.
As a further limitation of the technical solution of the embodiment of the present invention, the steps of generating the first authentication key and the second authentication key by the intelligent mobile terminal and the wearable device according to the instruction issuing time respectively include:
the intelligent mobile terminal inputs the instruction issuing time into a first data model, and matches a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model;
the intelligent mobile terminal sends the first authentication key and the instruction issuing time to the wearable equipment;
And the wearable equipment inputs the instruction issuing time into a second data model, and matches a second authentication key corresponding to the instruction issuing time in a ciphertext table of the second data model.
As further defined by the technical solution of the embodiment of the present invention, the step of the intelligent mobile terminal analyzing the bidirectional authentication passing information and judging whether to establish a secure communication channel with the wearable device includes:
the intelligent mobile terminal analyzes the bidirectional authentication passing information and judges whether the bidirectional authentication passing information contains the same content as the first authentication secret key and the second authentication secret key;
when the intelligent mobile terminal determines that the bidirectional authentication passing information does not contain the content identical to the first authentication secret key and the second authentication secret key, the intelligent mobile terminal refuses to establish a secure communication channel with the wearable equipment;
and when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key, establishing a secure communication channel with the wearable device.
As a further limitation of the technical solution of the embodiment of the present invention, when the intelligent mobile terminal determines that the bidirectional authentication passing information includes the same content as the first authentication key and the second authentication key, the step of establishing a secure communication channel with the wearable device includes:
When the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication secret key and the second authentication secret key, the first authentication secret key and the second authentication secret key are extracted;
the intelligent mobile terminal judges whether the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key;
if the intelligent mobile terminal judges that the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key format, a secure communication channel is established with the wearable device;
if the intelligent mobile terminal judges that the formats of the first authentication key and the second authentication key are different from the preset key format, the intelligent mobile terminal refuses to establish a secure communication channel with the wearable device.
A secure communication platform, the platform comprising: the device comprises an instruction issuing time recording unit, a first authentication key and second authentication key generating unit, a first authentication key and second authentication key comparing unit, a verification failure information sending unit, a two-way authentication passing information sending unit and a secure communication channel establishing unit, wherein:
the instruction issuing time recording unit is used for receiving the issuing instruction by the intelligent mobile terminal and recording the instruction issuing time of the issuing instruction;
The first authentication secret key and the second authentication secret key generation unit is used for respectively generating a first authentication secret key and a second authentication secret key according to the instruction issuing time by the intelligent mobile terminal and the wearable equipment;
the wearable device comprises a first authentication key and a second authentication key comparison unit, wherein the first authentication key and the second authentication key comparison unit is used for comparing the first authentication key with the second authentication key by the wearable device;
the wearable device is used for generating authentication failure information when the first authentication secret key is different from the second authentication secret key, and transmitting the authentication failure information to the intelligent mobile terminal;
the wearable device is used for generating a first authentication key and a second authentication key according to the authentication information, and transmitting the first authentication key and the second authentication key to the intelligent mobile terminal;
the secure communication channel establishing unit is used for the intelligent mobile terminal to analyze the two-way authentication passing information and judge whether to establish a secure communication channel with the wearable equipment.
As a further limitation of the technical solution of the embodiment of the present invention, the instruction issue time recording unit specifically includes:
the issuing instruction analysis module is used for receiving the issuing instruction by the intelligent mobile terminal and analyzing whether the issuing instruction needs to be sent to the wearable equipment or not;
And the instruction issuing time recording module is used for recording the instruction issuing time of the issuing instruction if the intelligent mobile terminal determines that the issuing instruction needs to be sent to the wearable equipment.
As a further limitation of the technical solution of the embodiment of the present invention, the first authentication key and the second authentication key generating unit specifically include:
the first authentication key generation module is used for inputting the instruction issuing time into the first data model by the intelligent mobile terminal, and matching a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model;
the intelligent mobile terminal is used for transmitting the first authentication secret key and the instruction issuing time to the wearable equipment;
the second authentication key generation module is used for inputting the instruction issuing time into the second data model by the wearable device, and matching a second authentication key corresponding to the instruction issuing time in a ciphertext table of the second data model.
As a further limitation of the technical solution of the embodiment of the present invention, the secure communication channel establishing unit specifically includes:
the two-way authentication passing information analysis module is used for analyzing the two-way authentication passing information by the intelligent mobile terminal and judging whether the two-way authentication passing information contains the same content as the first authentication secret key and the second authentication secret key or not;
The secure communication channel refusal establishing module is used for refusing to establish a secure communication channel with the wearable device when the intelligent mobile terminal determines that the bidirectional authentication passing information does not contain the same content as the first authentication key and the second authentication key;
and the secure communication channel establishment module is used for establishing a secure communication channel with the wearable device when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key.
Compared with the prior art, the method and the device have the advantages that the intelligent mobile terminal receives the issuing instruction and records the instruction issuing time of the issuing instruction; the intelligent mobile terminal and the wearable device respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time; the wearable device compares the first authentication key with the second authentication key; when the wearable device determines that the first authentication secret key and the second authentication secret key are different, generating verification failure information, and sending the verification failure information to the intelligent mobile terminal; when the wearable device determines that the first authentication secret key is the same as the second authentication secret key, generating two-way authentication passing information, and sending the two-way authentication passing information to the intelligent mobile terminal; the intelligent mobile terminal analyzes the bidirectional authentication passing information and judges whether a secure communication channel is established with the wearable equipment. When a secure communication channel is established between the intelligent mobile terminal and the wearable device, authentication keys generated by both parties can have instantaneity and randomness, so that the authentication keys cannot be obtained by external devices and personnel in a cracking way before specific contents are determined, and the generation rule of the authentication keys is difficult to obtain by the external devices and the personnel, thereby greatly improving the security degree of the communication channel established by the secure communication method.
Drawings
FIG. 1 is a flow chart of a method provided by an embodiment of the present invention;
FIG. 2 is a flowchart of recording a command issuing time in the method according to the embodiment of the present invention;
FIG. 3 is a flowchart of a method for generating a first authentication key and a second authentication key according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for determining whether to establish a secure communication channel with a wearable device according to an embodiment of the present invention;
FIG. 5 is a flowchart for determining whether the formats of the first authentication key and the second authentication key are the same as the preset key format in the method according to the embodiment of the present invention;
FIG. 6 is a diagram of an application architecture of a platform according to an embodiment of the present invention;
fig. 7 is a block diagram of a structure of an instruction issue time recording unit in a platform according to an embodiment of the present invention;
FIG. 8 is a block diagram illustrating a first authentication key and a second authentication key generating unit in a platform according to an embodiment of the present invention;
fig. 9 is a block diagram of a secure communication channel establishment unit in a platform according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms unless otherwise specified. These terms are only used to distinguish one element from another element. For example, a first xx script may be referred to as a second xx script, and similarly, a second xx script may be referred to as a first xx script, without departing from the scope of the present application.
Fig. 1 shows a flowchart of a method provided by an embodiment of the present invention.
Specifically, a secure communication method specifically includes the following steps:
step S100, the intelligent mobile terminal receives the issuing instruction and records the instruction issuing time of the issuing instruction.
Specifically, fig. 2 shows a flowchart of recording the instruction issue timing.
The intelligent mobile terminal receives the issuing instruction and records the instruction issuing time of the issuing instruction, and the intelligent mobile terminal specifically comprises the following steps:
step S101, an intelligent mobile terminal receives a issuing instruction and analyzes whether the issuing instruction needs to be sent to wearable equipment or not;
step S102, if the intelligent mobile terminal determines that the issuing instruction needs to be sent to the wearable equipment, the instruction issuing time of the issuing instruction is recorded.
In the embodiment of the invention, the intelligent mobile terminal capable of establishing communication connection with the user wearable equipment is generally a smart phone, and it can be understood that the intelligent mobile terminal is provided with the client APP corresponding to the wearable equipment, and the establishment of the communication connection between the intelligent terminal equipment and the wearable equipment refers to the establishment of the communication connection between the client APP installed in the intelligent terminal equipment and the wearable equipment;
after a user holding the intelligent mobile terminal issues an instruction on the intelligent mobile terminal, the intelligent mobile terminal analyzes the issuing instruction and judges whether the issuing instruction is required to be matched with the wearable equipment, when the wearable equipment is required to be matched, the intelligent mobile terminal is determined to be required to send the issuing instruction to the wearable equipment, and communication connection between the intelligent mobile terminal and the wearable equipment is required to be established, so that data can be mutually transferred between the intelligent mobile terminal and the wearable equipment, and the intelligent mobile terminal records and stores the instruction issuing time of the issuing instruction when the issuing instruction is determined to be required to be sent to the wearable equipment.
Further, the secure communication method further includes the steps of:
Step S200, the intelligent mobile terminal and the wearable equipment respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time;
the intelligent mobile terminal and the wearable device are respectively provided with a first data model and a second data model, the first data model and the second data model are respectively provided with the same ciphertext table, the ciphertext table comprises a plurality of preset instruction issuing time and a plurality of authentication keys, each preset instruction issuing time corresponds to a unique authentication key, preferably, the instruction issuing time and the preset instruction issuing time received by the intelligent mobile terminal and the wearable device are accurate to seconds, the specific format is XXXX month XX minute XX seconds, for example, the ciphertext table comprises one preset instruction issuing time 2023, 1 point, 1 minute, 1 second, the authentication key corresponding to the moment is 123456, the ciphertext table comprises another preset instruction issuing time 2023, 1 point, 1 minute, 2 seconds, and the authentication key corresponding to the moment is 654321.
In particular, fig. 3 shows a flow chart of generating a first authentication key and a second authentication key.
The intelligent mobile terminal and the wearable device respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time, and specifically comprise the following steps:
Step S201, the intelligent mobile terminal inputs the instruction issuing time into a first data model, and matches a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model;
step S202, the intelligent mobile terminal sends the first authentication secret key and the instruction issuing time to the wearable equipment;
in step S203, the wearable device inputs the instruction issue time to the second data model, and matches a second authentication key corresponding to the instruction issue time in a ciphertext table of the second data model.
In the embodiment of the invention, the instruction issuing time is a key premise that the intelligent mobile terminal and the wearable device acquire the first authentication secret key and the second authentication secret key, and because the instruction issuing time is real-time, the first authentication secret key and the second authentication secret key generated by the intelligent mobile terminal and the wearable device have instantaneity, so the first authentication secret key and the second authentication secret key cannot be obtained by being cracked by external devices and personnel before specific contents are determined, and further, the instruction issuing time is random and the random uncertainty is based on the time for using the intelligent mobile terminal and the wearable device for users, so that the external devices and personnel are difficult to obtain the generation rules of the first authentication secret key and the second authentication secret key when the intelligent mobile terminal and the wearable device generate the first authentication secret key and the second authentication secret key;
When the intelligent mobile terminal determines that the instruction issuing needs to be completed by the wearable device, the intelligent mobile terminal firstly inputs the recorded and stored instruction issuing time into a first data model, and matches a first authentication secret key corresponding to the instruction issuing time in a ciphertext table of the first data model, namely, finds out a first authentication secret key bound to a preset instruction issuing time identical to the instruction issuing time, then the intelligent mobile terminal sends the instruction issuing time and the first authentication secret key to the wearable device together, after receiving the instruction issuing time, the wearable device inputs the instruction issuing time into a second data model, and matches a second authentication secret key corresponding to the instruction issuing time in a ciphertext table of the second data model, namely, finds out a second authentication secret key bound to the preset instruction issuing time identical to the instruction issuing time, so that the intelligent mobile terminal and the wearable device respectively generate the first authentication secret key and the second authentication secret key.
Further, the secure communication method further includes the steps of:
step S300, the wearable device compares the first authentication key with the second authentication key.
And step S400, when the wearable device determines that the first authentication secret key and the second authentication secret key are different, generating verification failure information, and sending the verification failure information to the intelligent mobile terminal.
In the embodiment of the invention, after the intelligent mobile terminal and the wearable device respectively generate the first authentication secret key and the second authentication secret key, the wearable device can compare the first authentication secret key with the second authentication secret key and judge whether the wearable device has the establishment condition of the secure communication channel according to the comparison result, when the wearable device determines that the first authentication secret key and the second authentication secret key are different, verification failure information is generated and sent to the intelligent mobile terminal, the wearable device determines that multiple conditions exist in the first authentication secret key and the second authentication secret key, wherein the conditions exist that the external device and a user invade the wearable device through the illegal authentication secret key to attempt to establish the communication channel exist, for example, when the wearable device receives a request for establishing the communication channel, and does not recognize the issuing moment of an instruction in the request information, the communication channel is indicated that the request for establishing the secure communication channel is from the external device, and the user illegal invasion, when the conditions occur, the wearable device directly refuses to establish the secure communication channel, and then the wearable device generates verification failure information and sends the verification failure information to the intelligent mobile terminal, so that the external device can directly invade the wearable device through the secure communication channel in order to prevent the external device from invading the external device.
Further, the secure communication method further includes the steps of:
and step S500, when the wearable device determines that the first authentication secret key and the second authentication secret key are the same, generating two-way authentication passing information and sending the two-way authentication passing information to the intelligent mobile terminal.
Step S600, the intelligent mobile terminal analyzes the two-way authentication passing information and judges whether to establish a secure communication channel with the wearable device.
In the embodiment of the invention, when the wearable device determines that the first authentication secret key and the second authentication secret key are the same, the bidirectional authentication passing information is generated and sent to the intelligent mobile terminal, but the intelligent mobile terminal cannot determine that the intelligent mobile terminal and the wearable device are in a secure communication environment only by obtaining the bidirectional authentication passing information because the following conditions exist: the external equipment and the user forge the two-way authentication passing information and directly invade the intelligent mobile terminal through the two-way authentication passing information to attempt to establish a communication channel. Therefore, in the application, after the intelligent mobile terminal receives the bidirectional authentication passing information from the wearable device, the bidirectional authentication passing information should be subjected to auditing processing to determine whether the bidirectional authentication passing information is from the wearable device mutually bound with the intelligent mobile terminal, and whether the bidirectional authentication passing information meets the security auditing requirement of the application.
In particular, fig. 4 shows a flow chart of determining whether to establish a secure communication channel with a wearable device.
The intelligent mobile terminal analyzes the two-way authentication passing information and judges whether to establish a secure communication channel with the wearable device or not, and the method specifically comprises the following steps:
step S601, the intelligent mobile terminal analyzes the two-way authentication passing information and judges whether the two-way authentication passing information contains the same content of the first authentication key and the second authentication key;
step S601, when the intelligent mobile terminal determines that the bidirectional authentication passing information does not contain the same content of the first authentication secret key and the second authentication secret key, the intelligent mobile terminal refuses to establish a secure communication channel with the wearable device;
in step S603, when the intelligent mobile terminal determines that the mutual authentication passing information includes the same content as the first authentication key and the second authentication key, a secure communication channel is established with the wearable device.
Specifically, fig. 5 shows a flowchart for determining whether the formats of the first authentication key and the second authentication key are the same as the preset key format.
When the intelligent mobile terminal determines that the mutual authentication passing information contains the same content as the first authentication key and the second authentication key, the method for establishing the secure communication channel with the wearable device specifically comprises the following steps:
Step S6031, when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key, the first authentication key and the second authentication key are extracted;
step S6032, the intelligent mobile terminal judges whether the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key format;
step S6033, if the intelligent mobile terminal judges that the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key format, a secure communication channel is established with the wearable device;
in step S6034, if the intelligent mobile terminal determines that the formats of the first authentication key and the second authentication key are different from the preset key format, the intelligent mobile terminal refuses to establish the secure communication channel with the wearable device.
In the embodiment of the invention, when the wearable device generates the bidirectional authentication passing information, the bidirectional authentication passing information contains the specific content of the first authentication secret key, the specific content of the second authentication secret key and the same content of the first authentication secret key and the second authentication secret key, after the intelligent mobile terminal receives the bidirectional authentication passing information from the wearable device, the intelligent mobile terminal decodes the bidirectional authentication passing information in a near way and determines whether the bidirectional authentication passing information contains the specific content of the first authentication secret key, the specific content of the second authentication secret key and the same content of the second authentication secret key, if the bidirectional authentication passing information contains the specific content of the first authentication secret key, the specific content of the second authentication secret key and the same content of the second authentication secret key, the bidirectional authentication passing information is from the wearable device which is mutually bound with the intelligent mobile terminal, and accords with the rule of the establishment method of the secure communication channel, and if the intelligent mobile terminal does not find the specific content of the first authentication secret key, the specific content of the second authentication secret key and the same content of the second authentication secret key in the bidirectional authentication passing information, or if the specific content of the second authentication secret key and the first authentication secret key and the same content of the second authentication secret key are not found in the bidirectional authentication passing information, the mobile terminal directly passes through the secure communication channel, and the secure communication channel is completely established by the external communication channel;
It can be understood that, in order to improve the security degree of the establishment of the communication channel, when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the specific content of the first authentication key, the specific content of the second authentication key and the content identical to the specific content of the first authentication key and the second authentication key, the intelligent mobile terminal then examines the formats of the first authentication key and the second authentication key, and determines whether the formats of the first authentication key and the second authentication key are identical to the preset key format of the intelligent mobile terminal, the formats are mainly the character specification of the authentication key, thereby maximally ensuring the true reliability of the bidirectional authentication passing information and improving the security of the established secure communication channel;
through the technical scheme, when the secure communication channel is established between the intelligent mobile terminal and the wearable equipment, the authentication secret key generated by the two parties can have instantaneity and randomness, so that the authentication secret key cannot be obtained by external equipment and personnel in a cracking way before the specific content is determined, and the generation rule of the authentication secret key is difficult to obtain by the external equipment and the personnel, thereby greatly improving the security degree of the communication channel established by the secure communication method.
Further, fig. 6 shows an application architecture diagram of the platform according to an embodiment of the present invention.
In another preferred embodiment of the present invention, a secure communication platform includes:
the instruction issue time recording unit 100 is configured to receive an issue instruction from the intelligent mobile terminal, and record an instruction issue time of the issue instruction.
Specifically, fig. 7 shows a block diagram of the configuration of the instruction issue timing recording unit 100.
The instruction issue time recording unit 100 specifically includes:
the issuing instruction analysis module 101 is configured to receive an issuing instruction from an intelligent mobile terminal, and analyze whether the issuing instruction needs to be sent to a wearable device;
the instruction issue time recording module 102 is configured to record an instruction issue time of the issue instruction if the intelligent mobile terminal determines that the issue instruction needs to be sent to the wearable device.
In the embodiment of the invention, the intelligent mobile terminal capable of establishing communication connection with the user wearable equipment is generally a smart phone, and it can be understood that the intelligent mobile terminal is provided with the client APP corresponding to the wearable equipment, and the establishment of the communication connection between the intelligent terminal equipment and the wearable equipment refers to the establishment of the communication connection between the client APP installed in the intelligent terminal equipment and the wearable equipment;
After a user holding the intelligent mobile terminal issues an instruction on the intelligent mobile terminal, the intelligent mobile terminal analyzes the issue instruction and judges whether the issue instruction needs to be completed by the wearable device, when the wearable device needs to be completed by the cooperation, the issue instruction analysis module 101 determines that the intelligent mobile terminal needs to send the issue instruction to the wearable device, and needs to establish communication connection between the intelligent mobile terminal and the wearable device, so that data can be mutually transferred between the intelligent mobile terminal and the wearable device, and the instruction issue time recording module 102 records and stores the instruction issue time of the issue instruction when the issue instruction needs to be sent to the wearable device.
Further, the secure communication platform further comprises:
the first authentication key and second authentication key generating unit 200 is configured to generate a first authentication key and a second authentication key according to the instruction issuing time by the smart mobile terminal and the wearable device, respectively.
Specifically, fig. 8 shows a block diagram of the first authentication key and the second authentication key generation unit 200.
The first authentication key and the second authentication key generating unit 200 specifically include:
The first authentication key generation module 201 is configured to input the instruction issue time into the first data model by using the intelligent mobile terminal, and match a first authentication key corresponding to the instruction issue time in a ciphertext table of the first data model;
a first authentication key and instruction issue time sending module 202, configured to send, by an intelligent mobile terminal, both the first authentication key and the instruction issue time to a wearable device;
the second authentication key generation module 203 is configured to input the instruction issue time to the second data model by using the wearable device, and match a second authentication key corresponding to the instruction issue time in a ciphertext table of the second data model.
In the embodiment of the invention, a first data model and a second data model are respectively set in the intelligent mobile terminal and the wearable equipment, the first data model and the second data model are both stored with the same ciphertext table, the ciphertext table comprises a plurality of preset instruction issuing time and a plurality of authentication keys, each preset instruction issuing time corresponds to a unique authentication key, preferably, the instruction issuing time and the preset instruction issuing time received by the intelligent mobile terminal and the wearable equipment are accurate to seconds, the specific format is XXXX year XX month XX day XX minute XX seconds, for example, the ciphertext table comprises one preset instruction issuing time 2023, 1 day 1 minute 1 second, the authentication key corresponding to the time is 123456, the ciphertext table comprises another preset instruction issuing time 2023, 1 month 1 day 1 minute 2 seconds, and the authentication key corresponding to the time is 654321;
The instruction issuing time is a key premise that the intelligent mobile terminal and the wearable device acquire the first authentication secret key and the second authentication secret key, and because the instruction issuing time is real-time, the first authentication secret key and the second authentication secret key generated by the intelligent mobile terminal and the wearable device have instantaneity, so that the first authentication secret key and the second authentication secret key cannot be obtained by being cracked by external devices and personnel before specific contents are determined, and further, the instruction issuing time is random and is based on uncertainty of time for using the intelligent mobile terminal and the wearable device for a user, and therefore, when the intelligent mobile terminal and the wearable device generate the first authentication secret key and the second authentication secret key, the external devices and the personnel are difficult to obtain a generation rule;
when the intelligent mobile terminal determines that the instruction issuing needs to be matched with the wearable device, the first authentication key generation module 201 firstly inputs the instruction issuing time recorded and stored in the first data model, matches a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model, namely finds a first authentication key bound with a preset instruction issuing time identical to the instruction issuing time, then the first authentication key and the instruction issuing time sending module 202 send the instruction issuing time and the first authentication key to the wearable device together, the wearable device receives the instruction issuing time and inputs the instruction issuing time into the second data model, and the second authentication key generation module 203 matches a second authentication key corresponding to the instruction issuing time in a ciphertext table of the second data model, namely finds a second authentication key bound with the preset instruction issuing time identical to the instruction issuing time, so that the intelligent mobile terminal and the wearable device generate the first authentication key and the second authentication key respectively.
Further, the secure communication platform further comprises:
a first authentication key and second authentication key comparing unit 300, configured to compare the first authentication key with the second authentication key by using the wearable device;
and the authentication failure information sending unit 400 is configured to generate authentication failure information and send the authentication failure information to the intelligent mobile terminal when the wearable device determines that the first authentication key and the second authentication key are different.
In the embodiment of the present invention, after the smart mobile terminal and the wearable device respectively generate the first authentication key and the second authentication key, the first authentication key and the second authentication key comparing unit 300 may compare the first authentication key with the second authentication key, and judge whether there is an establishment condition of the secure communication channel according to the comparison result, when the wearable device determines that the first authentication key is different from the second authentication key, the authentication failure information sending unit 400 generates authentication failure information and sends the authentication failure information to the smart mobile terminal, the wearable device determines that there are multiple situations in which the first authentication key and the second authentication key are different, and an external device and a user invade the wearable device through an illegal authentication key to attempt to establish the communication channel.
Further, the secure communication platform further comprises:
the mutual authentication passing information sending unit 500 is configured to generate mutual authentication passing information when the wearable device determines that the first authentication key and the second authentication key are the same, and send the mutual authentication passing information to the intelligent mobile terminal;
the secure communication channel establishing unit 600 is configured to parse the bidirectional authentication passing information and determine whether to establish a secure communication channel with the wearable device.
In the embodiment of the present invention, when the wearable device determines that the first authentication key and the second authentication key are the same, mutual authentication passing information is generated, and the mutual authentication passing information is transmitted to the intelligent mobile terminal by the mutual authentication passing information transmitting unit 500, but the intelligent mobile terminal cannot determine that the intelligent mobile terminal and the wearable device are in a secure communication environment only by obtaining the mutual authentication passing information, because the following situation exists: the external equipment and the user forge the two-way authentication passing information and directly invade the intelligent mobile terminal through the two-way authentication passing information to attempt to establish a communication channel. Therefore, in the present application, after the smart mobile terminal receives the mutual authentication passing information from the wearable device, the secure communication channel establishing unit 600 should further perform an audit process on the mutual authentication passing information to determine whether the mutual authentication passing information is from the wearable device mutually bound with the smart mobile terminal, and determine whether the mutual authentication passing information meets the security audit requirement of the present application.
Specifically, fig. 9 shows a block diagram of the structure of the secure communication channel establishing unit 600.
The secure communication channel establishing unit 600 specifically includes:
the mutual authentication passing information analysis module 601 is configured to analyze the mutual authentication passing information and determine whether the mutual authentication passing information contains the same content as the first authentication key and the second authentication key;
a secure communication channel rejection establishing module 602, configured to reject establishing a secure communication channel with the wearable device when the intelligent mobile terminal determines that the bidirectional authentication passing information does not include the same content as the first authentication key and the second authentication key;
a secure communication channel establishment module 603, configured to establish a secure communication channel with the wearable device when the smart mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key
In the embodiment of the present invention, when the wearable device generates the bidirectional authentication passing information, the bidirectional authentication passing information should be made to include the specific content of the first authentication key, the specific content of the second authentication key and the same content of the two, after the intelligent mobile terminal receives the bidirectional authentication passing information from the wearable device, the bidirectional authentication passing information analysis module 601 interprets the bidirectional authentication passing information in a short time, and determines whether the bidirectional authentication passing information includes the specific content of the first authentication key, the specific content of the second authentication key and the same content of the two, if the bidirectional authentication passing information includes the specific content of the first authentication key, the specific content of the second authentication key and the same content of the two, it is explained that the bidirectional authentication passing information comes from the wearable device mutually bound with the intelligent mobile terminal and accords with the rule of the method for establishing a secure communication channel, and if the intelligent mobile terminal does not find the specific content of the first authentication key, the specific content of the second authentication key and the same content of the second authentication key in the bidirectional authentication passing information, or if the specific content of the two authentication passing information is not found in the bidirectional authentication passing information, or if the specific content of the second authentication key and the same content of the first authentication key and the wearable device are not found in the secure communication channel, the secure communication channel is established between the two mobile terminal and the wearable device, and the external communication channel is completely rejected, the intelligent mobile terminal is directly invaded by the information through the bidirectional authentication to successfully establish a communication channel;
It can be understood that, in order to improve the security degree of the establishment of the communication channel, when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the specific content of the first authentication key, the specific content of the second authentication key and the content identical to the specific content of the first authentication key and the second authentication key, the intelligent mobile terminal then examines the formats of the first authentication key and the second authentication key, and determines whether the formats of the first authentication key and the second authentication key are identical to the preset key format of the intelligent mobile terminal, the formats are mainly the character specification of the authentication key, thereby maximally ensuring the true reliability of the bidirectional authentication passing information and improving the security of the established secure communication channel.
It should be understood that, although the steps in the flowcharts of the embodiments of the present invention are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above-described embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above-described embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention and are described in detail herein without thereby limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.
The foregoing description of the preferred embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the invention.

Claims (10)

1. A method of secure communication, the method comprising:
the intelligent mobile terminal receives the issuing instruction and records the instruction issuing time of the issuing instruction;
The intelligent mobile terminal and the wearable device respectively generate a first authentication secret key and a second authentication secret key according to the instruction issuing time;
the wearable device compares the first authentication key with the second authentication key;
when the wearable device determines that the first authentication secret key and the second authentication secret key are different, generating verification failure information, and sending the verification failure information to the intelligent mobile terminal;
when the wearable device determines that the first authentication secret key is the same as the second authentication secret key, generating two-way authentication passing information, and sending the two-way authentication passing information to the intelligent mobile terminal;
the intelligent mobile terminal analyzes the bidirectional authentication passing information and judges whether a secure communication channel is established with the wearable equipment.
2. The method according to claim 1, wherein the step of the intelligent mobile terminal receiving the issuing instruction and recording the instruction issuing time of the issuing instruction comprises:
the intelligent mobile terminal receives the issuing instruction and analyzes whether the issuing instruction needs to be sent to the wearable equipment or not;
if the intelligent mobile terminal determines that the issuing instruction needs to be sent to the wearable equipment, the instruction issuing time of the issuing instruction is recorded.
3. The secure communication method according to claim 2, wherein a first data model and a second data model are respectively set up in the intelligent mobile terminal and the wearable device, and the same ciphertext table is stored in the first data model and the second data model, the ciphertext table includes a plurality of preset instruction issuing times and a plurality of authentication keys, and each preset instruction issuing time corresponds to a unique authentication key.
4. The secure communication method according to claim 3, wherein the steps of generating the first authentication key and the second authentication key respectively by the smart mobile terminal and the wearable device according to the instruction issuing time include:
the intelligent mobile terminal inputs the instruction issuing time into a first data model, and matches a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model;
the intelligent mobile terminal sends the first authentication key and the instruction issuing time to the wearable equipment;
and the wearable equipment inputs the instruction issuing time into a second data model, and matches a second authentication key corresponding to the instruction issuing time in a ciphertext table of the second data model.
5. The method according to claim 1, wherein the step of the intelligent mobile terminal resolving the two-way authentication passing information and determining whether to establish a secure communication channel with the wearable device comprises:
the intelligent mobile terminal analyzes the bidirectional authentication passing information and judges whether the bidirectional authentication passing information contains the same content as the first authentication secret key and the second authentication secret key;
when the intelligent mobile terminal determines that the bidirectional authentication passing information does not contain the content identical to the first authentication secret key and the second authentication secret key, the intelligent mobile terminal refuses to establish a secure communication channel with the wearable equipment;
and when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key, establishing a secure communication channel with the wearable device.
6. The method according to claim 5, wherein the step of establishing a secure communication channel with the wearable device when the smart mobile terminal determines that the mutual authentication passing information contains the same content as the first authentication key and the second authentication key, comprises:
when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication secret key and the second authentication secret key, the first authentication secret key and the second authentication secret key are extracted;
The intelligent mobile terminal judges whether the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key;
if the intelligent mobile terminal judges that the formats of the first authentication secret key and the second authentication secret key are the same as the preset secret key format, a secure communication channel is established with the wearable device;
if the intelligent mobile terminal judges that the formats of the first authentication key and the second authentication key are different from the preset key format, the intelligent mobile terminal refuses to establish a secure communication channel with the wearable device.
7. A secure communications platform, the platform comprising: the device comprises an instruction issuing time recording unit, a first authentication key and second authentication key generating unit, a first authentication key and second authentication key comparing unit, a verification failure information sending unit, a two-way authentication passing information sending unit and a secure communication channel establishing unit, wherein:
the instruction issuing time recording unit is used for receiving the issuing instruction by the intelligent mobile terminal and recording the instruction issuing time of the issuing instruction;
the first authentication secret key and the second authentication secret key generation unit is used for respectively generating a first authentication secret key and a second authentication secret key according to the instruction issuing time by the intelligent mobile terminal and the wearable equipment;
The wearable device comprises a first authentication key and a second authentication key comparison unit, wherein the first authentication key and the second authentication key comparison unit is used for comparing the first authentication key with the second authentication key by the wearable device;
the wearable device is used for generating authentication failure information when the first authentication secret key is different from the second authentication secret key, and transmitting the authentication failure information to the intelligent mobile terminal;
the wearable device is used for generating a first authentication key and a second authentication key according to the authentication information, and transmitting the first authentication key and the second authentication key to the intelligent mobile terminal;
the secure communication channel establishing unit is used for the intelligent mobile terminal to analyze the two-way authentication passing information and judge whether to establish a secure communication channel with the wearable equipment.
8. The secure communication platform of claim 7, wherein the instruction issue time recording unit specifically comprises:
the issuing instruction analysis module is used for receiving the issuing instruction by the intelligent mobile terminal and analyzing whether the issuing instruction needs to be sent to the wearable equipment or not;
and the instruction issuing time recording module is used for recording the instruction issuing time of the issuing instruction if the intelligent mobile terminal determines that the issuing instruction needs to be sent to the wearable equipment.
9. The secure communication platform of claim 7, wherein the first authentication key and the second authentication key generation unit specifically comprise:
the first authentication key generation module is used for inputting the instruction issuing time into the first data model by the intelligent mobile terminal, and matching a first authentication key corresponding to the instruction issuing time in a ciphertext table of the first data model;
the intelligent mobile terminal is used for transmitting the first authentication secret key and the instruction issuing time to the wearable equipment;
the second authentication key generation module is used for inputting the instruction issuing time into the second data model by the wearable device, and matching a second authentication key corresponding to the instruction issuing time in a ciphertext table of the second data model.
10. The secure communication platform of claim 7, wherein the secure communication channel establishment unit specifically comprises:
the two-way authentication passing information analysis module is used for analyzing the two-way authentication passing information by the intelligent mobile terminal and judging whether the two-way authentication passing information contains the same content as the first authentication secret key and the second authentication secret key or not;
The secure communication channel refusal establishing module is used for refusing to establish a secure communication channel with the wearable device when the intelligent mobile terminal determines that the bidirectional authentication passing information does not contain the same content as the first authentication key and the second authentication key;
and the secure communication channel establishment module is used for establishing a secure communication channel with the wearable device when the intelligent mobile terminal determines that the bidirectional authentication passing information contains the same content as the first authentication key and the second authentication key.
CN202311511879.1A 2023-11-14 2023-11-14 Secure communication method and platform Pending CN117424703A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311511879.1A CN117424703A (en) 2023-11-14 2023-11-14 Secure communication method and platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311511879.1A CN117424703A (en) 2023-11-14 2023-11-14 Secure communication method and platform

Publications (1)

Publication Number Publication Date
CN117424703A true CN117424703A (en) 2024-01-19

Family

ID=89522884

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311511879.1A Pending CN117424703A (en) 2023-11-14 2023-11-14 Secure communication method and platform

Country Status (1)

Country Link
CN (1) CN117424703A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN116416717A (en) * 2022-12-28 2023-07-11 上海洛轲智能科技有限公司 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN116416717A (en) * 2022-12-28 2023-07-11 上海洛轲智能科技有限公司 Vehicle unlocking method, vehicle end, vehicle, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US11127088B2 (en) Cross-blockchain interaction method, system, computer device, and storage medium
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
JP5739008B2 (en) Method, apparatus, and system for verifying a communication session
US20090307764A1 (en) Biometric Authenticaton System and Method with Vulnerability Verification
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
CN110647641A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN111241555A (en) Access method and device for simulating user login, computer equipment and storage medium
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
CN110445757A (en) Personnel information encryption method, device, computer equipment and storage medium
CN117424703A (en) Secure communication method and platform
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
CN112632497B (en) Identity information verification method and system based on blockchain
CN109413200A (en) A kind of method, client, MES and electronic equipment that resource imports
CN111131263B (en) Data viewing method and device
Pramono et al. Firebase Authentication Cloud Service for RESTful API Security on Employee Presence System
KR20190012026A (en) System and method for login authentication processing
CN111209546A (en) Online multi-person identity authentication method, system and device and identity authentication equipment
CN109995733B (en) Capability service opening method, device, system, equipment and medium
CN114666786A (en) Identity authentication method and system based on telecommunication smart card
CN111275506A (en) Bill issuing method and block link point equipment
CN111177780B (en) Security verification method, device, terminal equipment and computer readable storage medium
KR102468849B1 (en) Identity authentication system and method thereof
KR102296322B1 (en) Identity authentication system and method thereof
CN116668189A (en) Computer network user identity login verification system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination