MX361298B - Método y aparato de verificación de terminal. - Google Patents

Método y aparato de verificación de terminal.

Info

Publication number
MX361298B
MX361298B MX2015003764A MX2015003764A MX361298B MX 361298 B MX361298 B MX 361298B MX 2015003764 A MX2015003764 A MX 2015003764A MX 2015003764 A MX2015003764 A MX 2015003764A MX 361298 B MX361298 B MX 361298B
Authority
MX
Mexico
Prior art keywords
terminal
server
verification
security component
authenticity
Prior art date
Application number
MX2015003764A
Other languages
English (en)
Other versions
MX2015003764A (es
Inventor
Junqi Lin
Feng Hong
Yifan Zhu
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Publication of MX2015003764A publication Critical patent/MX2015003764A/es
Publication of MX361298B publication Critical patent/MX361298B/es

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • AHUMAN NECESSITIES
    • A01AGRICULTURE; FORESTRY; ANIMAL HUSBANDRY; HUNTING; TRAPPING; FISHING
    • A01BSOIL WORKING IN AGRICULTURE OR FORESTRY; PARTS, DETAILS, OR ACCESSORIES OF AGRICULTURAL MACHINES OR IMPLEMENTS, IN GENERAL
    • A01B1/00Hand tools
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0869Network architectures or network communication protocols for network security for authentication of entities for achieving mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2153Using hardware token as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Power Engineering (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Mathematical Physics (AREA)
  • Mechanical Engineering (AREA)
  • Soil Sciences (AREA)
  • Environmental Sciences (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

La presente divulgación se relaciona con un método y un aparato para verificar una terminal, y pertenece al campo de la tecnología de computadoras; el método incluye: establecer un canal seguro con un servidor a través de un elemento seguro en la terminal; enviar parámetros de hardware de terminal originales en el elemento seguro al servidor a través del canal seguro usando el elemento seguro, el servidor está configurado para retroalimentar la información identificación de conformidad con los parámetros de hardware de terminal; y determinar un resultado de verificación de la autenticidad de la terminal de conformidad con la información de identificación retroalimentada por el servidor; el aparato incluye: un módulo de establecimiento de canal, un módulo de envío de parámetros y un módulo de determinación de resultados; la presente divulgación resuelve el problema de que el programa de aplicación de verificación no puede identificar la autenticidad de la terminal debido a la degradación del rendimiento de la terminal, y logra el efecto de que mejore la precisión de la autenticidad de verificación de la terminal.
MX2015003764A 2014-10-31 2015-01-21 Método y aparato de verificación de terminal. MX361298B (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410602394.8A CN104484593B (zh) 2014-10-31 2014-10-31 终端验证方法及装置
PCT/CN2015/071248 WO2016065749A1 (zh) 2014-10-31 2015-01-21 终端验证方法及装置

Publications (2)

Publication Number Publication Date
MX2015003764A MX2015003764A (es) 2016-08-01
MX361298B true MX361298B (es) 2018-11-30

Family

ID=52759134

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2015003764A MX361298B (es) 2014-10-31 2015-01-21 Método y aparato de verificación de terminal.

Country Status (8)

Country Link
EP (1) EP3016349B1 (es)
JP (1) JP6126755B2 (es)
KR (1) KR101642019B1 (es)
CN (1) CN104484593B (es)
BR (1) BR112015006794B1 (es)
MX (1) MX361298B (es)
RU (1) RU2608187C2 (es)
WO (1) WO2016065749A1 (es)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794626B (zh) * 2015-04-28 2018-09-11 广东欧珀移动通信有限公司 一种基于硬件信息的防伪方法和装置
KR102446384B1 (ko) * 2015-09-18 2022-09-22 삼성전자주식회사 사용자 단말 및 서버 장치
CN106919856B (zh) * 2015-12-25 2020-01-07 展讯通信(上海)有限公司 安全移动终端
CN106255102B (zh) * 2016-07-26 2019-12-27 Oppo广东移动通信有限公司 一种终端设备的鉴定方法及相关设备
CN106331337B (zh) * 2016-08-22 2019-11-08 北京小米移动软件有限公司 终端外设的启动方法及装置
JP6888445B2 (ja) * 2017-07-10 2021-06-16 大日本印刷株式会社 セキュアエレメント、コンピュータプログラム、デバイス、サーバ及びトラステッドアプリケーションのインストレーション方法
CN115580854B (zh) 2019-04-16 2023-08-04 华为技术有限公司 蓝牙扫描方法和电子设备
US20230015049A1 (en) * 2019-12-31 2023-01-19 Service Lee Technologies Pvt. Ltd. System and method for determining authenticity of a mobile device
JP7559344B2 (ja) * 2020-04-15 2024-10-02 大日本印刷株式会社 認可に基づくリソースアクセス制御システム、セキュアなコンポーネント、デバイス及び認可に基づくリソースアクセス制御方法

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030059773A (ko) * 2003-06-16 2003-07-10 주식회사 아이오셀 정보처리 단말기
RU2354066C2 (ru) * 2003-11-07 2009-04-27 Телеком Италия С.П.А. Способ и система для аутентификации пользователя системы обработки данных
CN1697424A (zh) * 2005-05-09 2005-11-16 朱文和 一种基于十进制通信号码进行私有安全数据通信的方法
EP1811421A1 (en) * 2005-12-29 2007-07-25 AXSionics AG Security token and method for authentication of a user with the security token
CN100533457C (zh) * 2006-01-18 2009-08-26 株式会社Pfu 目标设备、用于管理设备的方法和系统以及外部设备
KR100920644B1 (ko) * 2008-01-25 2009-10-07 주식회사 케이티 Usim 카드 이동에 따른 이동통신 단말 업데이트를 위한시스템, 장치 및 방법
EA016997B1 (ru) * 2008-05-14 2012-09-28 Шин, Елена Ильинична Способ дистанционной аутентификации пользователя в компьютерных сетях для осуществления защищенных транзакций с использованием мобильного телефона
EP2404459A2 (en) * 2009-03-06 2012-01-11 Interdigital Patent Holdings, Inc. Platform validation and management of wireless devices
US20100306531A1 (en) * 2009-05-29 2010-12-02 Ebay Inc. Hardware-Based Zero-Knowledge Strong Authentication (H0KSA)
JP2011197912A (ja) * 2010-03-18 2011-10-06 Dainippon Printing Co Ltd シンクライアントシステム、完全性検証サーバ、プログラム、記憶媒体、シンクライアント通信中継方法
TWI584625B (zh) * 2010-04-12 2017-05-21 內數位專利控股公司 網路裝置及用來執行網路裝置的完整性確認的方法
JP2012009938A (ja) * 2010-06-22 2012-01-12 Toshiba Tec Corp 情報処理装置及びプログラム
CN103067333B (zh) * 2011-10-18 2016-03-30 华为终端有限公司 验证机顶盒接入身份的方法和认证服务器
KR20140050322A (ko) * 2012-10-19 2014-04-29 삼성전자주식회사 사용자 디바이스의 고유 식별자 제공 방법 및 장치
KR20140098872A (ko) * 2013-01-31 2014-08-08 남궁용주 모바일 nfc단말기 웹 서비스를 위한 바이오인식과 tsm 기반의 보안 시스템 및 방법
EP2999156B1 (en) * 2013-05-15 2019-07-31 Mitsubishi Electric Corporation Device authenticity determination system and device authenticity determination method
CN103646044A (zh) * 2013-11-19 2014-03-19 北京奇虎科技有限公司 移动终端鉴别方法及装置
CN103841239B (zh) * 2014-03-12 2016-08-24 北京安兔兔科技有限公司 终端真伪验证方法及装置

Also Published As

Publication number Publication date
MX2015003764A (es) 2016-08-01
EP3016349A1 (en) 2016-05-04
CN104484593B (zh) 2017-10-20
JP2017503289A (ja) 2017-01-26
KR20160064033A (ko) 2016-06-07
EP3016349B1 (en) 2018-10-17
CN104484593A (zh) 2015-04-01
JP6126755B2 (ja) 2017-05-10
WO2016065749A1 (zh) 2016-05-06
KR101642019B1 (ko) 2016-07-22
RU2608187C2 (ru) 2017-01-17
BR112015006794A2 (pt) 2017-07-04
BR112015006794B1 (pt) 2022-07-26
RU2015111264A (ru) 2016-10-20

Similar Documents

Publication Publication Date Title
MX361298B (es) Método y aparato de verificación de terminal.
EP4485302A3 (en) Synchronization and verification groups among related devices
PH12019502321A1 (en) Picture-based vehicle loss assessment method and apparatus, and electronic device
MX359562B (es) Metodo y aparato para enlazar un dispositivo.
EP3779753A3 (en) Validation cryptogram for interaction
AU2018320772A1 (en) Systems and methods for verification of income
PH12018502021A1 (en) Method, system, and apparatus for payment authorization and payment by means of a wearable device
WO2013134290A3 (en) Digital content delivery
PH12016501640A1 (en) Techniques to operate a service with machine generated authentication tokens
MX2016012082A (es) Metodos y sistemas para recomendar configuraciones de comunicacion.
MX2016005769A (es) Alineacion de tiempo de datos de sensor.
SG11201908565PA (en) Information processing method and device based on internet of things
GB2552435A (en) Screen-analysis based device security
MX2015009491A (es) Procedimiento y aparato de autenticacion de usuarios basados en datos de audio y video.
SG11201806674TA (en) Electronic payment service processing method and device, and electronic payment method and device
MX363020B (es) Metodos, sistemas y aparatos de firma electronica.
SG10201810422SA (en) Dual channel identity authentication
MX2014010373A (es) Derivaciones agregadas flexibles basadas en tiempo para analisis avanzado.
PH12018501016B1 (en) Information recommendation method and apparatus
MY185366A (en) Audio information processing method and device
BR112018005435A2 (pt) processamento de áudio colaborativo
IN2015CH03249A (es)
PH12016502164A1 (en) System and method for facilitating electronic transaction
MX2016001577A (es) Aparato de procesamiento de informacion y metodo para proporcionar resultados de determinacion.
MX2018015248A (es) Sistema y metodo para incorporar contenido creativo de marca en servicios de mensajeria.

Legal Events

Date Code Title Description
FG Grant or registration