WO2018123760A1 - Système d'authentification, procédé d'authentification et dispositif de génération de code de localisation - Google Patents
Système d'authentification, procédé d'authentification et dispositif de génération de code de localisation Download PDFInfo
- Publication number
- WO2018123760A1 WO2018123760A1 PCT/JP2017/045686 JP2017045686W WO2018123760A1 WO 2018123760 A1 WO2018123760 A1 WO 2018123760A1 JP 2017045686 W JP2017045686 W JP 2017045686W WO 2018123760 A1 WO2018123760 A1 WO 2018123760A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- location code
- code generation
- electronic terminal
- generation device
- authentication
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
Definitions
- the present invention relates to an authentication system using an electronic terminal.
- Patent Document 1 Conventionally, two-step authentication methods and one-time password authentication methods (see, for example, Patent Document 1) are generally well known for user authentication (person authentication) using a mobile terminal.
- the one-time password authentication method not only the elements that only the user knows, such as the user ID and password, but the second element, that is, nobody can predict, and it is effective only once for each login.
- a simple one-time password is used, and these are combined to perform user authentication.
- the one-time password is transmitted from the authentication server via the portable electronic terminal owned by the user, so that the user ID and password are stolen.
- the user ID and password are stolen.
- impersonation may be performed in user authentication.
- an object of the present invention is to provide an authentication system, an authentication method, and a location code generation device that can effectively prevent so-called impersonation in user authentication.
- a digital watt-hour meter and a specific function location based on a specific function meter identification information assigned to the watt-hour meter are specified.
- a location code generation unit that generates a code
- a location code generation device that includes a communication processing unit that transmits the location code by a predetermined communication method, and an electronic terminal that has received the location code transmitted by the communication processing unit
- an authentication server that receives the location code and authenticates the electronic terminal based on the location code.
- the location code generation unit includes, in addition to the electricity meter identification information, unique location code generation device identification information assigned to the location code generation unit, and salt information supplied from the authentication server.
- the location code is generated based on the function expression by the function formula.
- the communication processing unit transmits the location code to the electronic terminal by ultrasonic communication.
- an alive signal generated by the location code generation device in the state where the watt-hour meter, the location code generation device, and the electronic terminal are activated is the watt-hour meter, the location
- the authentication server transmits salt information to the location code generation device when the authentication server can confirm the presence of the alive signal. To do.
- the authentication server authenticates the electronic terminal based on the alive signal, the user ID and password, the location code, and device identification information unique to the electronic terminal.
- an authentication step of authenticating the electronic terminal by an authentication server is a location code generation step of generating a unique location code by a location code generation unit according to a predetermined function formula based on unique watt-hour meter identification information assigned to the digital watt-hour meter.
- a location code generation unit that generates a unique location code by a predetermined function formula using unique watt-hour meter identification information assigned to a digital watt-hour meter, and the location And a communication processing unit that transmits the code to the electronic terminal.
- the location code generation unit includes, in addition to the electricity meter identification information, unique location code generation device identification information assigned to the location code generation unit, and salt information supplied from an authentication server. Based on the function formula, the location code is generated.
- the communication processing unit transmits the location code by ultrasonic communication.
- so-called impersonation can be effectively prevented in user authentication.
- FIG. 6 is a schematic diagram for explaining a relationship between a location code generated by the location code generation device according to the embodiment of the present invention and a location code expected to be generated by the location code generation device by the ID password authentication server. is there.
- it is an approximate line figure with which it uses for description of the activation process of a location code production
- it is a flowchart showing the procedure of the activation process of the location code generation device and the first and second electronic terminals.
- it is a flowchart which shows the procedure of the activation process of a location code production
- It is a sequence chart which shows the authentication process sequence in the authentication system which concerns on embodiment of this invention.
- it is a basic diagram with which it uses for description of a series of flow from the production
- FIG. 5 is a basic diagram with which it uses for description of four elements of an authentication process.
- 5 is a flowchart illustrating an authentication processing procedure by an ID password authentication server in the embodiment of the present invention.
- the newest alive signal cannot be acquired, it is an approximate line figure with which it uses for description of the example which does not recognize login authentication.
- it is an approximate line figure used for description of the example which does not recognize login authentication when the latest alive signal cannot be acquired and salt answer information does not correspond.
- a schematic diagram for explaining an example in which login authentication is not allowed when the latest alive signal cannot be acquired, the salt answer information does not match, and the device identification information of the electronic terminal does not match It is.
- FIG. 10 is a schematic diagram for explaining an example in which login authentication is not permitted in the case of theft.
- it is a block diagram which shows the whole structure (1) of the authentication system using both A route and B route.
- it is a block diagram which shows the whole structure (2) of the authentication system using both A route and B route.
- it is a block diagram which shows the whole structure (3) of the authentication system using both A route and B route.
- it is an approximate line figure with which it uses for description of the authentication process by the authentication system using both A route and B route.
- the authentication system 1 in the embodiment of the present invention includes a smart meter 20, a smart meter management server 30, a location code generation device 40, an electronic terminal 60, and an ID password authentication server 80. .
- the smart meter 20 is wirelessly connected to the smart meter management server 30 via a first communication path called a so-called A route, and wirelessly connected to the location code generation device 40 via a second communication path called a so-called B route. It is connected.
- the A route is data corresponding to the power usage measured by the smart meter 20 with respect to the smart meter management server 30 prepared by the electric power company (hereinafter also referred to as “power usage data”). .)) Is a communication path of an access network that directly transmits.
- a plurality of smart meters 20 transmit data by wireless multi-hop communication to a concentrator (not shown) while performing a so-called bucket relay.
- the concentrator may be connected to the smart meter management server 30 via a WAN (Wide Area Network) line and a router.
- WAN Wide Area Network
- the B route is a connection between the HEMS (Home Energy Management System) terminal in the building and the smart meter 20 by a wireless method using the 920 MHz band (Wi-SUN) as a physical layer, and the power consumption of the smart meter 20 is used. It is a communication path of a home communication network that transmits quantity data to the HEMS terminal. Therefore, the smart meter 20 can communicate with the location code generation device 40 via the B route connected to the HEMS terminal in the building.
- HEMS Home Energy Management System
- the smart meters 20A and 20B may be connected to a distribution board 90 connected to a home appliance such as an indoor air conditioner, and the smart meter 20B,
- the smart meter 20A may be connected in series.
- the smart meters 20A and 20B do not necessarily have to be separate from the location code generation device 40, and may have an integrated configuration incorporating the location code generation device 40.
- the smart meter 20 has a first PLC (Power (Line Communication) device D1 and a second PLC when the distance from the smart meter 20 to the location code generation device 40M (master device) is long. It is possible to connect to the location code generation device 40M (master unit) via the PLC device D2.
- PLC Power (Line Communication) device D1
- second PLC When the distance from the smart meter 20 to the location code generation device 40M (master device) is long. It is possible to connect to the location code generation device 40M (master unit) via the PLC device D2.
- the smart meter 20 is wirelessly connected to the location code generation device 40S (slave device), and the location code generation device 40S (slave device) and the first PLC device D1 are connected.
- the location code generation device 40M (master device) is connected to the second PLC device D2.
- the first PLC device D1 and the second PLC device D2 are connected to the power line via the outlets C1 and C2, and the first PLC device D1 and the second PLC device D2 are connected to the power line communication (for example, Both are connected by G3-PLC).
- the present invention is not limited to this, and the first PLC device D1 and the second PLC device D2 may be connected to each other via the distribution board 90 (FIG. 2).
- the smart meter 20 may be integrated with the first PLC device D1, or the location code generation device 40 may be integrated with the second PLC device D2.
- a power supply unit such as an outlet C1 is disposed in the vicinity of the place where the smart meter 20 is installed, and electric power is supplied from the outlet C1 to the smart meter 20.
- the smart meter 20 is generally a digital watt-hour meter that is individually attached to each minimum unit of a consumer who pays an electricity bill for each household, each store, and the like.
- the smart meter 20 has an arithmetic processing function and a communication function for performing communication with the outside.
- a smart meter 20 is provided for each floor and each store such as a building, and the owner owns a plurality of smart meters 20 when the owner of the building is the minimum unit for paying the electricity bill.
- the smart meter 20A is owned by a consumer who pays an electric charge like the smart meters 20A and 20B
- the smart meter 20B is irrelevant to the payment of the electric charge.
- the smart meter 20 can be purchased and installed as a private item separately from the electric power company in order to construct the authentication system 1 regardless of the payment of the electricity bill.
- Smart meter 20 is a unique watt hour meter that is different from one another. Accordingly, each of the plurality of smart meters 20 has unique (unique) smart meter identification information (hereinafter also referred to as “SM identification information”).
- the SM identification information assigned to the smart meter 20 is unique information that cannot be rewritten.
- the smart meter 20 includes a power usage metering unit 21, a smart meter storage unit 22, and a communication processing unit 25.
- the power usage metering unit 21 is a functional unit that measures and holds the power usage when power is used, and is based on measurement values measured by a current sensor that measures current, a voltage sensor that measures voltage, and the like. To calculate the power consumption data.
- the power usage metering unit 21 is configured by, for example, a CPU (Central Processing Unit), a memory, an MCU (Micro Control Unit) including an interface, and the like.
- the power usage metering unit 21 stores an activation ID and an initial password for activating the location code generation device 40 and the smart meter 20 in the smart meter storage unit 22.
- activate means that devices connected to each other are validated.
- the smart meter storage unit 22 is a functional unit that stores unique (unique) SM identification information assigned to the smart meter 20 in a non-rewritable state.
- the smart meter storage unit 22 includes, for example, a ROM (Read Only Memory). That is, as shown in FIG. 5A, the smart meter 20 has unique SM identification information that is unique and cannot be rewritten.
- the communication processing unit 25 is a functional unit that transmits the power usage data supplied from the power usage metering unit 21 to the outside, and includes, for example, a wireless LSI (Large-Scale Integration) that supports 920 MHz.
- the communication processing unit 25 wirelessly transmits the power usage data to the smart meter management server 30, for example, every 30 minutes via the A route. However, the communication processing unit 25 may wire-transmit the power usage data via the A route.
- the communication processing unit 25 modulates a 920 MHz carrier wave based on the SM identification information of the smart meter 20 stored in the smart meter storage unit 22, for example, and generates a location code using the resulting modulated signal as a radio wave. Wireless transmission to the device 40 via the B route.
- the smart meter management server 30 (FIG. 1) is a server that has a CPU, a large-capacity storage, a network interface, and the like, and manages many smart meters 20.
- the smart meter management server 30 centrally manages the location (address, etc.) where the smart meter 20 is installed, the SM identification information of the smart meter 20, the personal information of the contractor of the smart meter 20, and the like.
- the smart meter management server 30 is connected to an ID password authentication server 80 described later via a network NT such as the Internet.
- the smart meter management server 30 always maintains a communication connection state with the smart meter 20, and if the smart meter 20 breaks down or is removed due to theft, the smart meter management server 30 communicates with the smart meter 20. It can be detected that the connection state is not maintained, and it is possible to determine that the connection state is abnormal. In this case, the smart meter management server 30 can notify the ID password authentication server 80 that the smart meter 20 is in an abnormal state via a network such as the Internet.
- the location code generation device 40 is wirelessly connected to the smart meter 20 and the electronic terminal 60, and in particular, is connected to the electronic terminal 60 by an ultrasonic communication method.
- an optical communication method with high directivity such as infrared communication and visible light communication, Bluetooth (registered trademark), WLAN (Wireless Local Area Network), etc. May be connected by a short-range wireless communication system.
- the location code generation device 40 includes a storage unit 41, a control unit 42, and a communication processing unit 43.
- the storage unit 41 is a functional unit that stores unique (unique) identification information (hereinafter, also referred to as “LC identification information”) assigned in advance to the location code generation device 40, and is a rewritable ROM (Read For example, flash memory.
- LC identification information unique (unique) identification information assigned in advance to the location code generation device 40
- ROM rewritable ROM
- the storage unit 41 since the storage unit 41 has a unique connection relationship between the location code generation device 40 and the smart meter 20, it is possible to store the SM identification information of the smart meter 20 in addition to the LC identification information in advance. In that case, it may be composed of a non-rewritable ROM or the like.
- the location code generation device 40 has unique LC identification information in advance. Further, the storage unit 41 does not store the SM identification information in advance, but receives the SM identification information from the smart meter 20 via the communication processing unit 43 and stores the SM identification information together with the LC identification information. Is also possible.
- a dedicated application program for generating a location code is installed in the storage unit 41 in advance.
- the communication processing unit 43 performs ultrasonic communication with the electronic terminal 60 based on the application program.
- the control unit 42 includes an MCU including a CPU, a memory, and an interface.
- the location code generation unit 42a, the activation processing unit 42b, the alive signal generation unit 42c, and the like are obtained by cooperation between the MCU and the application program. Each functional part is built.
- the location code generation unit 42 a is a functional unit that generates a code related to the location where the smart meter 20 and the location code generation device 40 are attached (hereinafter also referred to as “location code”). Specifically, the location code generation unit 42 a stores a predetermined salt answer function expression provided in advance from the ID password authentication server 80 in the storage unit 41.
- the location code generation unit 42a uses the salt answer function expression based on the salt answer function expression using the salt information (any arbitrary data) given from the ID password authentication server 80, the LC identification information stored in the storage unit 41, and the SM identification information. Generate informational location code.
- the salt answer function expression generates salt answer information (encrypted data such as a hash value) by a hash function that performs irreversible processing, for example, when salt information is given from the ID password authentication server 80. It is a function expression that The salt information is data serving as an input for calculating the salt answer information based on the salt answer function expression.
- power usage data can be used as the salt information. However, it is not limited to the power usage data, and it is possible to use various arbitrary data such as a value of a set of prime numbers, a random number value, or the like.
- This salt answer function expression is provided in advance from the ID password authentication server 80 as a unique (unique) function expression that is different for each location code generation device 40. That is, as shown in FIG. 5C, the location code generation device 40 holds a unique (unique) salt answer function expression.
- the ID password authentication server 80 stores a correspondence relationship between the location code generation device 40 and the salt answer function formula.
- the location code generation unit 42a stores the unique (unique) salt answer function formula, and uses the salt information, the LC identification information, and the SM identification information, and the location composed of serial data by the salt answer function formula. Generate code as salt answer information.
- the location code generation unit 42a does not have to generate the location code by using the salt answer function equation using all of the salt information, the LC identification information, and the SM identification information.
- the location code may be generated by an answer function expression, or the location code may be generated by arbitrarily combining salt information, LC identification information, and SM identification information.
- the location code generation devices 40a and 40b there are two location code generation devices 40a and 40b, and even when the same salt information (for example, [XKH48269PIM]) is provided from the ID password authentication server 80, the location code generation device 40a. 40b, the salt answer function formulas are different from each other, the LC identification information (AA-BB-CC) and the LC identification information (ZZ-YY-XX) are different, and the SM identification information is also different from each other. .
- the same salt information for example, [XKH48269PIM]
- the location code generation unit 42a of the location code generation device 40a generates a unique location code (for example, [POPPNNJRFFSS]) as the salt answer information, and the location code of the location code generation device 40b.
- the generation unit 42a generates a unique location code (for example, [TPGVELNWPS]) as salt answer information.
- the activation processing unit 42b is a functional unit that performs activation processing of the location code generation device 40, the electronic terminal 60, and the smart meter 20.
- the activation processing unit 42b stores therein an activation ID, an initial password, and the like, and activates the location code generation device 40 and the electronic terminal 60 using the activation ID and the initial password, thereby generating the location code generation device. 40 and the smart meter 20 are activated.
- the alive signal generation unit 42c receives the power usage fee data wirelessly transmitted every 30 minutes via the communication processing unit 25 of the smart meter 20 by the communication processing unit 43 described later, based on the power usage fee data.
- This is a functional unit that generates an alive signal every predetermined time (for example, every second) and transmits the alive signal to the smart meter 20 again via the communication processing unit 43.
- the alive signal AL is the location code generation device in an activated state where the location code generation device 40, the smart meter 20, and the electronic terminal 60 are effectively connected.
- the presence of this alive signal AL means that a network topology with three regular parties is established.
- the communication processing unit 43 establishes (activates) wireless communication with the smart meter 20 via the B route in accordance with the application program stored in the storage unit 41, and SM identification information of the location code generation device 40 from the smart meter 20. Can be received.
- the communication processing unit 43 exchanges the alive signal AL between the smart meter 20 and the electronic terminal 60.
- the communication processing unit 43 can receive the salt information and the alive signal AL from the ID password authentication server 80 as ultrasonic waves from the electronic terminal 60 by the microphone 46, and is generated by the location code generation unit 42a.
- the location code can be oscillated from the speaker 45 to the electronic terminal 60 as an ultrasonic wave.
- the communication processing unit 43 includes a radio signal conversion unit 43a, an ultrasonic conversion unit 43b, and an acoustic processing unit 43c.
- the wireless signal conversion unit 43a has the same configuration as the communication processing unit 25 of the smart meter 20. Therefore, the radio signal conversion unit 43a demodulates the radio wave received from the smart meter 20, restores the SM identification information and the alive signal AL, and performs conversion processing such as modulating the alive signal AL to be wirelessly transmitted to the smart meter 20. Is possible.
- the wireless signal conversion unit 43 a stores the SM identification information obtained from the smart meter 20 in the storage unit 41.
- the wireless signal conversion unit 43a can also transmit the location code generated by the location code generation unit 42a from the smart meter 20 to the smart meter management server 30 by a so-called A route.
- the carrier wave is modulated on the basis of the signal and wirelessly transmitted to the smart meter 20 as a radio wave.
- the ultrasonic conversion unit 43b When the ultrasonic conversion unit 43b receives the location code or the alive signal AL including the serial data generated by the location code generation unit 42a via the wireless signal conversion unit 43a, the ultrasonic conversion unit 43b outputs the location code from the speaker 45 as an ultrasonic wave. It is a function part which converts into the ultrasonic signal of.
- the acoustic processing unit 43c generates an ultrasonic sound source corresponding to the ultrasonic signal supplied from the ultrasonic conversion unit 43b, outputs the ultrasonic sound source from the speaker 45, and receives the ultrasonic wave output from the speaker of the electronic terminal 60 by the microphone 46.
- the functional unit outputs the ultrasonic signal to the ultrasonic conversion unit 43b.
- the acoustic processing unit 43c receives salt information as ultrasonic waves from the ID password authentication server 80 via the electronic terminal 60 or receives the alive signal AL as ultrasonic waves from the electronic terminal 60
- the ultrasonic signal is It outputs to the location code generation part 42a via the ultrasonic conversion part 43b and the radio signal conversion part 43a.
- the reason why ultrasonic communication is performed between the location code generation device 40 and the electronic terminal 60 is that the location code generation device 40 and the electronic device 40 are connected to the electronic terminal 60 without requiring complicated processing to establish a communication link compared to radio wave communication. This is because it is easy to establish a communication link with the terminal 60 and the confidentiality at the time of data transmission is high. Ultrasonic waves need only be converted into ultrasonic waves from the signal sent to the counterpart device, oscillated from the speaker, and received by the microphone of the counterpart device, and only by software without the need for a special hardware configuration. It is a communication method that can be realized.
- the transmission speed of ultrasonic waves is as low as 1 / 1,000,000 compared to electricity and light, the reachable range is limited, and the directivity is strong, so the installation interval between the location code generation device 40 and the electronic terminal 60 is shortened. Therefore, the risk of leakage is reduced as compared with the case where the installation interval is long.
- Electronic terminal 60 is wired (or wirelessly connected) to ID password authentication server 80 via routers rt1 and rt2.
- the electronic terminal 60 and the ID password authentication server 80 may be connected without using the routers rt1 and rt2, or may be connected wirelessly.
- the electronic terminal 60 is preferably an electronic device including a speaker and a microphone that can transmit and receive at least ultrasonic waves, such as a smartphone, a notebook computer, and a mobile phone.
- the electronic terminal 60 is a computer device having a CPU, ROM, RAM, memory, speaker, microphone, camera, and the like.
- the electronic terminal 60 used in the authentication system 1 is preinstalled with a dedicated application program for performing ultrasonic communication and various dedicated processes with the location code generating device 40. It is the same as a smartphone.
- the electronic terminal 60 When the electronic terminal 60 performs ultrasonic communication with the location code generation device 40, the electronic terminal 60 can perform ultrasonic communication via its own speaker and microphone according to the application program. Specifically, the electronic terminal 60 transmits the salt information from the ID password authentication server 80 to the location code generation device 40 or uses the location code that is the salt answer information generated by the location code generation device 40 as an ultrasonic wave. It can be received and transmitted to the ID password authentication server 80.
- the electronic terminal 60 stores the unique device identification information assigned to the electronic terminal 60 in advance in the memory, and when the login authentication request is made to the ID password authentication server 80, the device identification information is also sent to the ID password authentication server 80. Wireless transmission. It is assumed that the ID password authentication server 80 stores the device identification information of the electronic terminal 60 in advance.
- the ID password authentication server 80 is a server having a CPU, a large-capacity storage, a network interface, etc., and authenticates that the electronic terminal 60 is a valid user before the electronic terminal 60 accesses, for example, a content server. It is.
- the ID password authentication server 80 includes a communication processing unit 80a composed of a network interface, a storage unit 80b composed of a large-capacity storage, and an authentication processing unit 80c composed of a CPU.
- the functions of the communication processing unit 80a, the storage unit 80b, and the authentication processing unit 80c of the ID password authentication server 80 are performed by the cooperation of these hardware resources and a predetermined authentication program stored in the storage unit 80b. Realized.
- the communication processing unit 80a is a functional unit that wirelessly transmits and receives data between the ID password authentication server 80 and the electronic terminal 60.
- the storage unit 80b is a functional unit that stores salt information, a salt answer function formula, SM identification information of the smart meter 20, LC identification information of the location code generation device 40, device identification information of the electronic terminal 60, and the like.
- the authentication processing unit 80c includes salt answer information (location code) received from the location code generation device 40, an alive signal AL received from the electronic terminal 60, SM identification information of the smart meter 20, a user ID from the electronic terminal 60, a password, and , A functional unit that performs login authentication based on device identification information and the like, details of which will be described later.
- the ID password authentication server 80 can transmit salt information to the electronic terminal 60 by the communication processing unit 80a, and can transmit the salt information as ultrasonic waves to the location code generation device 40 via the electronic terminal 60. Further, the ID password authentication server 80 can receive the salt answer information (location code) from the location code generation device 40 and the user ID, password, and device identification information from the electronic terminal 60 by the communication processing unit 80a. .
- the ID password authentication server 80 uses the salt information ([XKH48269PIM]) transmitted to the location code generation device 40 and the same salt answer function expression as the location code generation device 40 holds. It is stored in the storage unit 80b. Therefore, the ID password authentication server 80 can determine the validity of the salt answer information ([POPPNNJRFFSS]), that is, the location code received from the electronic terminal 60, by the authentication processing unit 80c.
- the authentication processing unit 80c performs a login authentication process using not only the salt answer information (location code) but also the alive signal AL, the user ID from the electronic terminal 60, the password, device identification information, and the like.
- the smart meter 20, the location code generation device 40, and the electronic terminal 60 are each physically unique as devices, and the topology of a single network that connects the three parties respectively. Is also unique. Therefore, in the authentication system 1, in addition to these three parties, the entire network topology including the smart meter management server 30 and the ID password authentication server 80 is also unique, and the ID password authentication is performed from the smart meter management server 30. Signals can be transmitted and received in the network up to the server 80. In other words, the path goes through the entire network.
- the network topology will also change. For example, when the network topology is activated and data based on the rule is not transmitted / received to / from the entire topology, the ID password authentication server 80 may reject the authentication based on the user ID and password from the electronic terminal 60. It becomes possible.
- the ID password authentication server 80 includes the location code generation device 40 and the smart meter 20 associated with the user ID and password used when the electronic terminal 60 logs in to the ID password authentication server 80. Is recognized in advance. Therefore, the ID password authentication server 80 cannot link the three parties because the above-described correspondence cannot be established with other smart meters 20, other location code generation devices 40, and other user IDs and password combinations. It is like that.
- the location code generation device 40 can be activated with the smart meter 20 and the electronic terminal 60, and when activated, the location code generation device 40 may continuously receive data transmitted from the smart meter 20 and the electronic terminal 60. It becomes possible to transmit the location code and the alive signal AL generated by itself to the smart meter 20 and the electronic terminal 60 that are being activated.
- the location code generation device 40 limits the data (location code) transmitted to the electronic terminal 60, and the limitation continues until it is activated again.
- the combination of the activated location code generator 40 and the smart meter 20 is unique, and the location code generator 40 is limited to the smart meter 20 once activated with the smart meter 20. Can be reactivated. Therefore, the location code generation device 40 cannot be activated with any smart meter 20 other than the smart meter 20 that was activated first, and the location code generation device 40 cannot be diverted for connection with other smart meters 20. It becomes possible.
- the location code generation device 40 can activate a plurality of activations with the electronic terminal 60, but certain conditions are necessary to activate with the second and subsequent electronic terminals 60. It will be described later.
- ⁇ Activation of location code generator with smart meter and electronic terminal First, before activating the location code generation device 40 and the smart meter 20, it is necessary to activate the location code generation device 40 and the electronic terminal 60. The reason is that the smart meter 20 and the location code generation device 40 may not have an input unit (mouse, keyboard, etc.) and a display unit (liquid crystal screen, etc.) for displaying the input result. This is because there is no way to activate.
- an input unit mouse, keyboard, etc.
- a display unit liquid crystal screen, etc.
- the electronic terminal 60 when activating the location code generation device 40 and the first electronic terminal 60, the electronic terminal 60 receives an activation ID and an initial password for activating the location code generation device 40. It is received from the ID password authentication server 80 and stored in advance.
- the terminal 60 can store the activation ID and the initial password.
- the electronic terminal 60 reads the activation ID and the initial password according to the user's operation, and transmits them to the location code generation device 40 by ultrasonic communication.
- the activation processing unit 42b of the location code generation device 40 determines whether or not the activation ID and the initial password from the electronic terminal 60 are correct, and when it is determined to be correct, the activation with the first electronic terminal 60 is performed. Execute the process. Note that after the activation is completed, the user can change the initial password to an arbitrary value, but the activation ID cannot be changed because it is a unique ID linked to the location code generation device 40.
- the electronic terminal 60 activates the activation ID and the initial password used when activating the location code generation device 40. Is wirelessly transmitted to the smart meter 20 via the location code generation device 40.
- the power usage metering unit 21 of the smart meter 20 determines whether the activation ID and the initial password are correct, and executes the activation process with the location code generation device 40 when it is determined that the activation ID and the initial password are correct.
- the location code generation device 40 and the second electronic terminal 60s are activated will be described.
- the activation process between the smart meter 20 and the first electronic terminal 60 needs to be completed.
- step SP1 the control unit 42 of the location code generation device 40 determines whether or not what is received from the electronic terminal 60 via the communication processing unit 43 is an activation request.
- step SP1: NO the determination is made by the activation processing unit 42b and a negative result is obtained (step SP1: NO)
- step SP2 the process proceeds to the next step SP2
- step SP1: YES the process proceeds to step SP5.
- step SP2 the activation processing unit 42b of the control unit 42 determines whether or not what is received via the communication processing unit 43 is an activation request from the smart meter 20, by the activation processing unit 42b.
- an activation request is made from the smart meter 20 to the location code generation device 40 via the electronic terminal 60.
- step SP2 If a negative result is obtained in step SP2 (step SP2: NO), this means that the activation request is not from the legitimate electronic terminal 60 and smart meter 20 associated with the location code generation device 40. In this case, the activation processing unit 42b proceeds to the next step SP3. On the other hand, if a positive result is obtained in step SP2 (step SP2: YES), the process proceeds to the next step SP4, and the process proceeds to an activation process with the smart meter 20 as described later.
- step SP3 since the activation processing unit 42b is not an activation request from the authorized electronic terminal 60 and the authorized smart meter 20, it notifies the electronic terminal 60 of an error and activates the display screen of the electronic terminal 60. A bait error is displayed and the activation process is terminated.
- step SP5 the activation processing unit 42b determines whether or not the electronic terminal 60 that has received the activation request is the first one. If the location code generation device 40 is in the non-activated state, the electronic terminal 60 is activated. Is the first unit, a positive result is obtained (step SP5: YES), and the routine proceeds to the next step SP6.
- step SP6 the activation processing unit 42b receives the activation ID for activation and the initial password for activation from the electronic terminal 60, and proceeds to the next step SP7.
- step SP7 the activation processing unit 42b determines whether both the activation ID received from the electronic terminal 60 and the activation initial password are correct.
- the activation ID and the initial activation password are received in advance from the ID password authentication server 80, and the activation processing unit 42b of the location code generation device 40 receives the activation ID.
- the activation ID assigned to the electronic terminal 60 and the initial password for activation are stored.
- step SP7 If an affirmative result is obtained in step SP7 (step SP7: YES), the activation processing unit 42b activates the activation ID stored in itself, the activation initial password, and the activation received from the electronic terminal 60. Since the ID and the activation initial password match, it can be recognized that the electronic terminal 60 is a legitimate electronic terminal 60 having a valid connection relationship. Therefore, the activation processing unit 42b moves to the next step SP8, performs the activation processing with the electronic terminal 60, and then returns to step SP1 again.
- step SP7 if a negative result is obtained in step SP7 (step SP7: NO), the activation processing unit 42b does not match the activation ID and the initial password for activation, and has a valid connection relationship. It recognizes that it is not the legitimate electronic terminal 60, moves to the next step SP9, displays an activation error on the electronic terminal 60, and then returns to step SP1 again.
- step SP5 if a negative result is obtained in step SP5 (step SP5: NO), this means that the electronic terminal 60 that has accepted the activation request is not the first unit but the second unit, In this case, the activation processing unit 42b proceeds to the next step SP10 and performs the activation processing for the second electronic terminal 60s.
- step SP10 the activation processing unit 42b generates a temporary password for the second electronic terminal 60s only when it has already been activated with the first electronic terminal 60, and generates this temporary password for the first electronic terminal.
- 60 is transmitted by ultrasonic communication by the communication processing unit 43, and the process proceeds to the next step SP11.
- step SP11 the first electronic terminal 60 displays the received temporary password.
- step SP12 the temporary password and the same activation ID as in the case of the first electronic terminal 60 are input from the second electronic terminal 60s.
- step SP13 the activation processing unit 42b receives the activation ID and the temporary password, proceeds to the processing of the next step SP7 to step SP9, and determines the second electronic terminal 60s based on the activation ID and the temporary password. Execute the activation process.
- the same activation ID as that of the first electronic terminal 60 can be received from the second electronic terminal 60s because the owner of the first electronic terminal 60 and the second electronic terminal 60s is authorized. This is because the user is the same as the user and can be said to be a regular second electronic terminal 60 s following the regular first electronic terminal 60.
- step SP41 the activation processing unit 42b of the location code generation device 40 determines whether or not the location code generation device 40 and the first electronic terminal 60 have already been activated. If a negative result is obtained (step SP41: NO), the process returns to step SP1 (FIG. 15). If a positive result is obtained (step SP41: YES), the process proceeds to the next step SP42. *
- step SP42 the activation processing unit 42b wirelessly connects to the smart meter 20 by the communication processing unit 43 in response to a request from the already activated electronic terminal 60, and proceeds to the next step SP43.
- step SP43 the activation processing unit 42b substitutes the smart meter 20 from the activated electronic terminal 60 for the activation ID previously assigned to the smart meter 20 from the ID password authentication server 80 and the initial password for activation. It is determined whether or not it has been received. If a negative result is obtained (step SP43: NO), the process returns to step SP43 again, and the activation processing unit 42b receives the activation ID of the smart meter 20 and the activation initial password from the electronic terminal 60. Wait until you do.
- step SP43 YES
- the activation processing unit 42b proceeds to the next step SP44 to step S46, and performs the same operation on the smart meter 20 as in step SP7 to step SP9. Execute the activation process.
- step SP44 when the activation processing unit 42b recognizes the legitimate smart meter 20 having a valid connection relationship with the location code generation device 40 based on the activation ID and the initial password for activation (step SP44: YES), activation processing with the smart meter 20 is performed in step SP45.
- step SP44 when the activation processing unit 42b recognizes that it is not the legitimate electronic terminal 60 that does not have a valid connection relationship based on the activation ID and the initial password for activation (step SP44: NO), In step SP46, the electronic terminal 60 is notified and displayed that an activation error has occurred between the smart meter 20 and the location code generation device 40, and then the activation process with the smart meter 20 is terminated.
- the electronic terminal 60 sends the activation ID and the activation initial password to the location code generation device 40 as authentication information from the electronic terminal 60 for activating the location code generation device 40 in the processing procedure SK1. Send.
- the location code generation device 40 performs an activation process with the electronic terminal 60 when the authentication of the electronic terminal 60 is successful, and notifies the electronic terminal 60 that it has been activated. That is, the location code generation device 40 first completes the activation process with the electronic terminal 60.
- the location code generation device 40 completes the activation process with the smart meter 20 in the processing procedures SK3 and SK4, similarly to the activation processing (processing procedures SK1 and SK2) of the electronic terminal 60.
- the controller 42 of the location code generator 40 completes the activation process with both the electronic terminal 60 and the smart meter 20 and has established a regular three-party topology. Therefore, in the processing procedure SK5, the alive signal generator 42c. Generates an alive signal AL and transmits it to the smart meter 20.
- the communication processing unit 25 of the smart meter 20 receives the alive signal AL transmitted from the location code generation device 40 in the processing procedure SK6, it returns this to the location code generation device 40.
- the location code generation device 40 When the location code generation device 40 receives the alive signal AL from the smart meter 20 by the communication processing unit 43 in the processing procedure SK7, the location code generation device 40 transmits the alive signal AL to the electronic terminal 60 via the communication processing unit 43 by ultrasonic communication. To do.
- the electronic terminal 60 When the electronic terminal 60 receives the alive signal AL in the processing procedure SK8, the electronic terminal 60 immediately returns the alive signal AL to the location code generation device 40 by ultrasonic communication. As described above, the location code generation device 40 continues to circulate the alive signal AL between the three parties as shown in FIG. However, the circulation direction of the alive signal AL is the opposite direction, that is, the location code generator 40 ⁇ the electronic terminal 60 ⁇ the location code generator 40 ⁇ the smart meter 20 ⁇ the location code generator 40 ⁇ . Also good.
- the electronic terminal 60 establishes a normal topology among the three of the location code generation device 40 and the smart meter 20, and the alive signal AL can be circulated.
- Authentication request information including a user ID and password for logging in and unique device identification information assigned to the electronic terminal 60 is transmitted to the ID password authentication server 80.
- the ID password authentication server 80 generates salt information in the processing procedures SK10 and SK11, and transmits the salt information to the location code generation device 40 via the electronic terminal 60 by ultrasonic communication.
- the location code generation device 40 uses the SM identification information of the smart meter 20, the LC identification information of the location code generation device 40, and the salt information to obtain a predetermined salt answer.
- the unique salt answer information (location code) is generated by the function expression, and is transmitted from the electronic terminal 60 to the ID password authentication server 80.
- the ID password authentication server 80 performs authenticity determination on the login request from the electronic terminal 60 in the processing procedure SK14. Specifically, as shown in FIG. 20, the ID password authentication server 80 has a regular and unique network topology that the smart meter 20, the location code generation device 40, and the electronic terminal 60 recognize the ID password authentication server 80.
- the latest alive signal AL that circulates the three parties, the user ID from the electronic terminal 60, the password, the salt answer information (location code) generated by the location code generation device 40, and the uniqueness of the electronic terminal 60 Only when all of the device identification information is correctly prepared, it is determined that the login request from the electronic terminal 60 is true, and login authentication is permitted.
- the login authentication processing procedure by the ID password authentication server 80 will be specifically described with reference to the flowchart of FIG.
- the authentication processing unit 80c of the ID password authentication server 80 authenticates from the electronic terminal 60 with the alive signal AL, the user ID, the password, and the device identification information of the electronic terminal 60 in step SP51 of the processing procedure SK14. It is determined whether or not the request information has been received by the communication processing unit 80a. If a negative result is obtained (step SP51: NO), it waits until the authentication request information is received, and if a positive result is obtained (step SP51: YES). ), And proceeds to the next Step SP52.
- the authentication processing unit 80c determines whether or not it is the latest alive signal AL based on the generation time of the alive signal AL included in the authentication request information received from the electronic terminal 60. As described above, since the alive signal AL is generated every second, the authentication processing unit 80c can determine whether or not it is the latest alive signal AL by comparing with the current time. For example, if the difference between the time when the alive signal AL is generated and the current time is within 2 seconds, for example, the alive signal AL may be determined to be the latest alive signal.
- step SP52 the authentication processing unit 80c determines whether or not the latest alive signal AL has been normally received.
- step SP52: NO a negative result is obtained (step SP52: NO)
- the authentication processing unit 80c moves to step SP58, transmits non-authentication result information indicating “NOT TRUE” to the electronic terminal 60, displays “NOT TRUE” on the electronic terminal 60, and then performs login authentication processing. End the procedure.
- step SP52 if a positive result is obtained in step SP52 (step SP52: YES), the authentication processing unit 80c causes the smart meter 20, the location code generation device 40, and the electronic terminal 60 to be connected to the ID password authentication server 80. Recognizing that the authorized and unique network topology is constructed, the process proceeds to the next step SP53, and the salt information is transmitted to the electronic terminal 60 by the communication processing unit 80a.
- the electronic terminal 60 transmits the salt information to the location code generation device 40.
- the location code generation device 40 generates salt answer information (location code) by using a salt answer function equation using the salt information, SM identification information, and LC identification information, and transmits this to the ID password authentication server 80 from the electronic terminal 60. .
- step SP54 the authentication processing unit 80c receives the salt answer information (location code) from the location code generation device 40, and proceeds to the next step SP55.
- step SP55 the authentication processing unit 80c, the latest alive signal AL, the user ID and password from the electronic terminal 60, the salt answer information (location code) generated by the location code generation device 40, and the device identification of the electronic terminal 60 Only when all four elements of information are correctly aligned, an affirmative result is obtained (step SP55: YES), and the process proceeds to the next step SP56.
- step SP56 the authentication processing unit 80c executes login processing for the electronic terminal 60, and transmits authentication result information representing “TRUE” in the next step SP57, thereby displaying “TRUE” on the electronic terminal 60. Thereafter, the login authentication processing procedure is terminated.
- step SP55 if a negative result is obtained in step SP55 (step SP55: NO), this means that the authentication processing unit 80c cannot recognize the login because all four elements are not prepared. After moving to step SP58 and transmitting the non-authentication result information to the electronic terminal 60 as described above, the login authentication processing procedure is terminated.
- step SP55 when a negative result is obtained in step SP55, for example, when only the latest alive signal AL cannot be acquired as shown in FIG. 22, as shown in FIG. 23, the latest alive signal AL and salt answer information are obtained.
- (location code) cannot be acquired, as shown in FIG. 24, the latest alive signal AL, salt answer information (location code) and device identification information cannot be acquired, and as shown in FIG. There are cases where all cannot be acquired.
- a malicious third party illegally obtains the user ID and password, illegally obtains the electronic terminal 60, illegally obtains the location code generation device 40, and smart meter. If 20 is obtained illegally, it may be possible that spoofing by a malicious third party may be possible.
- the smart meter management server 30 determines that the smart meter 20 is not installed at the original location or is in an abnormal state in which a failure has occurred, and ID password authentication is performed via the Internet for the abnormal information indicating the abnormality. It is possible to transmit to the server 80.
- the ID password authentication server 80 performs unauthorized login authentication. Can be prevented and invalid login authentication by a malicious third party can be effectively invalidated.
- the login authentication process is performed only when the three parties of the smart meter 20, the location code generation device 40, and the electronic terminal 60 construct a regular and unique network topology that the ID password authentication server 80 recognizes. Therefore, spoofing by a malicious third party can be prevented much more than before, and the security of the security on the network can be further ensured as compared with the past.
- the authentication system 1a includes a smart meter 20, a location code authentication and smart meter management server 30s, a location code generation device 40, an electronic terminal 60, and An ID password authentication server 80 is provided.
- This authentication system 1a is different in that a location code authentication and smart meter management server 30s is provided.
- the location code authentication and smart meter management server 30 s can receive the location code generated by the location code generation device 40 from the smart meter 20 through a so-called A route.
- the location code generator 40 transmits the location code to the ID password authentication server 80 via the electronic terminal 60 by the so-called B route as before, and the ID password authentication server 80 receives the location code received via the B route.
- the location code is authenticated and transmitted to the smart meter management server 30s via the router rt3, the Internet, and the router rt4.
- the location code authentication and smart meter management server 30s has basically the same configuration as the configuration of the ID password authentication server 80 (FIG. 9), and the location code received via the A route in the authentication processing unit (not shown) , Matching with the location code received via the B route.
- the location code authentication and smart meter management server 30 s recognizes that the location code is the same as the normal login authentication, transmits the authentication result information indicating “TRUE” to the smart meter 20 via the A route, and B
- the location code generation device 40 transmits the route information to the electronic terminal 60 via the route, and transmits the authentication result information to the ID password authentication server 80 via the Internet.
- the ID password authentication server 80 can execute a login process using the user ID and password by the electronic terminal 60 based on the location code authentication and the authentication result information received from the smart meter management server 30s.
- the authentication system 1b includes a smart meter 20, a smart meter management server 30, a location code generation device 40, an electronic terminal 60, and a location code.
- An authentication and ID password authentication server 80s is provided.
- This authentication system 1b is different in that, in particular, a location code authentication and ID password authentication server 80s is provided.
- the smart meter management server 30 receives the location code generated by the location code generation device 40 from the smart meter 20 through a so-called A route.
- the smart meter management server 30 transmits the location code to the location code authentication and ID password authentication server 80s via the router rt4, the Internet, and the router rt3.
- the location code generation device 40 transmits the location code to the location code authentication and ID password authentication server 80s via the electronic terminal 60 by the so-called B route as before.
- the location code authentication and ID password authentication server 80s performs matching between the location code received via the A route and the location code received via the B route in the authentication processing unit 80c.
- the location code authentication and ID password authentication server 80 s recognizes that the location code of both matches as normal login authentication, transmits authentication result information indicating “TRUE” to the electronic terminal 60, and logs in by the electronic terminal 60. Execute the process.
- the present invention is not limited to this, and the location code authentication and ID password authentication server 80s can also send authentication result information from the smart meter 20 to the electronic terminal 60 via the location code generation device 40 via the A route. is there.
- the authentication system 1c includes a smart meter 20, a smart meter management server 30, a location code generation device 40, an electronic terminal 60, an ID password authentication server.
- a location code authentication server 100 is provided. This authentication system 1c is particularly different in that a location code authentication server 100 is newly provided.
- the location code authentication server 100 has basically the same configuration as the configuration of the ID password authentication server 80 (FIG. 9).
- the location code authentication server 100 recognizes as normal login authentication when both location codes match, and transmits authentication result information indicating “TRUE” to the electronic terminal 60 via the A route or the B route.
- the location code authentication and smart meter management server 30s in the authentication systems 1a to 1c, the location code authentication and ID password authentication server 80s, or the location code authentication server 100, the A route
- the location codes received from both the route B and the route B are matched, and if both location codes match, it is accepted as normal login authentication.
- authentication is performed using not only the location code but also the latest alive signal AL, the user ID from the electronic terminal 60, the password, and the device identification information of the electronic terminal 60.
- the authentication systems 1a to 1c can effectively invalidate the illegal login authentication and guarantee the security on the network.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention peut empêcher efficacement une usurpation d'identité par rapport à une authentification d'utilisateur, même lorsqu'un terminal de réception a été usurpé. La présente invention comprend : un compteur de watt-heure numérique (20) ; un dispositif de génération de code d'emplacement (40) qui a une unité de génération de code d'emplacement (42a) qui, sur la base d'informations d'identification de compteur de watt-heure uniques (informations d'identification de SM) qui a été attribué au compteur de watt-heure (20), utilise une formule de fonction prescrite afin de générer un code d'emplacement unique, et une unité de traitement de communication (43) qui utilise un système de communication prescrit afin de transmettre le code d'emplacement ; et un serveur d'authentification (80) qui reçoit un code d'emplacement à partir d'un terminal électronique (60) qui a reçu le code d'emplacement transmis par l'unité de traitement de communication (43), et authentifie le terminal électronique (60) sur la base du code d'emplacement.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016255991A JP6836145B2 (ja) | 2016-12-28 | 2016-12-28 | 認証システム、認証方法、および、所在地コード生成装置 |
JP2016-255991 | 2016-12-28 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018123760A1 true WO2018123760A1 (fr) | 2018-07-05 |
Family
ID=62707670
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2017/045686 WO2018123760A1 (fr) | 2016-12-28 | 2017-12-20 | Système d'authentification, procédé d'authentification et dispositif de génération de code de localisation |
Country Status (2)
Country | Link |
---|---|
JP (1) | JP6836145B2 (fr) |
WO (1) | WO2018123760A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191134A (zh) * | 2019-06-06 | 2019-08-30 | 南方电网科学研究院有限责任公司 | 智能电表认证方法、认证服务器、终端、系统及智能电表 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014075970A (ja) * | 2012-02-10 | 2014-04-24 | Panasonic Corp | コントローラ、及び通信方法 |
WO2015001600A1 (fr) * | 2013-07-01 | 2015-01-08 | 三菱電機株式会社 | Système d'authentification d'équipement, dispositif de génération de clé de fabricant, dispositif de génération de clé d'équipement, équipement de production, dispositif d'authentification coopérative, dispositif de génération de clé de lecture d'équipement, procédé d'authentification d'équipement et programme d'authentification d'équipement |
WO2015045345A1 (fr) * | 2013-09-27 | 2015-04-02 | パナソニックIpマネジメント株式会社 | Appareil de communication, programme de réglage et tableau de distribution incorporant l'appareil de communication |
JP2016177464A (ja) * | 2015-03-19 | 2016-10-06 | 日本電気株式会社 | 通信システムおよびその制御方法 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10124750A (ja) * | 1996-10-18 | 1998-05-15 | Fujitsu General Ltd | 商品精算システム |
JP2005163245A (ja) * | 2003-11-28 | 2005-06-23 | Yoshimitsu Nagao | インターネット及びネットワークを経由して生地や物体に埋め込む無線icタグからの情報により、組立・縫製製品及び物体の模造識別方法と製造過程確認及び流通経路の掌握並びに遠隔組立・製造支援を行うシステム |
DE102006015212B4 (de) * | 2006-03-30 | 2017-05-04 | Bundesdruckerei Gmbh | Verfahren zum Schutz eines beweglichen Gutes, insbesondere eines Fahrzeugs, gegen unberechtigte Nutzung |
JP2008040634A (ja) * | 2006-08-03 | 2008-02-21 | Chugoku Electric Power Co Inc:The | 公衆浴場施設における利用者連絡システム |
JP2018107777A (ja) * | 2016-12-28 | 2018-07-05 | 東京電力ホールディングス株式会社 | 認証システム及び認証方法 |
-
2016
- 2016-12-28 JP JP2016255991A patent/JP6836145B2/ja active Active
-
2017
- 2017-12-20 WO PCT/JP2017/045686 patent/WO2018123760A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2014075970A (ja) * | 2012-02-10 | 2014-04-24 | Panasonic Corp | コントローラ、及び通信方法 |
WO2015001600A1 (fr) * | 2013-07-01 | 2015-01-08 | 三菱電機株式会社 | Système d'authentification d'équipement, dispositif de génération de clé de fabricant, dispositif de génération de clé d'équipement, équipement de production, dispositif d'authentification coopérative, dispositif de génération de clé de lecture d'équipement, procédé d'authentification d'équipement et programme d'authentification d'équipement |
WO2015045345A1 (fr) * | 2013-09-27 | 2015-04-02 | パナソニックIpマネジメント株式会社 | Appareil de communication, programme de réglage et tableau de distribution incorporant l'appareil de communication |
JP2016177464A (ja) * | 2015-03-19 | 2016-10-06 | 日本電気株式会社 | 通信システムおよびその制御方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110191134A (zh) * | 2019-06-06 | 2019-08-30 | 南方电网科学研究院有限责任公司 | 智能电表认证方法、认证服务器、终端、系统及智能电表 |
CN110191134B (zh) * | 2019-06-06 | 2021-09-10 | 南方电网科学研究院有限责任公司 | 智能电表认证方法、认证服务器、终端、系统及智能电表 |
Also Published As
Publication number | Publication date |
---|---|
JP2018107776A (ja) | 2018-07-05 |
JP6836145B2 (ja) | 2021-02-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018123761A1 (fr) | Système d'authentification, procédé d'authentification et dispositif de génération de code de localisation | |
US10911424B2 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
CN104380655B (zh) | 在受限装置上进行证书撤销状态验证的机制 | |
KR102169947B1 (ko) | 에이전트 디바이스에 대한 신뢰된 신원을 확립하는 방법 | |
US20150113592A1 (en) | Method of establishing a trusted identity for an agent device | |
CN110505606A (zh) | 蓝牙Mesh网络及其配网鉴权方法、设备和存储介质 | |
JP2018506770A (ja) | マシンツーマシン装置のためのプロビジョニング・プラットフォーム | |
JP7090161B2 (ja) | セキュアな取引のための装置の自己認証 | |
CN110601858B (zh) | 证书管理方法及装置 | |
WO2018123760A1 (fr) | Système d'authentification, procédé d'authentification et dispositif de génération de code de localisation | |
CN104899533A (zh) | 身份证信息获取方法、装置及系统 | |
JP2018107777A (ja) | 認証システム及び認証方法 | |
JP6821141B2 (ja) | 認証システムおよび認証方法 | |
US20130326591A1 (en) | Wireless communication device and wireless communication method | |
US20190349348A1 (en) | Registry apparatus, agent device, application providing apparatus and corresponding methods | |
JP6890768B2 (ja) | 認証システムおよび認証方法 | |
CN107396295B (zh) | 一种用于对用户设备进行无线连接预授权的方法与设备 | |
JP6824512B2 (ja) | 認証システムおよび認証方法 | |
JP6877686B2 (ja) | 認証システム及び認証方法 | |
JP6843369B2 (ja) | 認証システム及び認証方法 | |
JP7004953B2 (ja) | 認証システムおよび認証方法 | |
KR20220091970A (ko) | 아이디 및 패스워드를 공유하기 위한 전자 장치, 그 동작 방법 및 서버 | |
JP2004318856A (ja) | 情報処理システム、情報処理装置および方法、並びにプログラム | |
KR20110005609A (ko) | 위치 기반 오티피 제공 방법 및 시스템과 이를 위한 오티피 장치 및 기록매체 | |
CN111028059A (zh) | 基于区块链的物品交换方法、装置、设备及存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17888590 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17888590 Country of ref document: EP Kind code of ref document: A1 |