WO2023087895A1 - 设备认证方法和系统、物联网设备和认证服务器 - Google Patents
设备认证方法和系统、物联网设备和认证服务器 Download PDFInfo
- Publication number
- WO2023087895A1 WO2023087895A1 PCT/CN2022/120073 CN2022120073W WO2023087895A1 WO 2023087895 A1 WO2023087895 A1 WO 2023087895A1 CN 2022120073 W CN2022120073 W CN 2022120073W WO 2023087895 A1 WO2023087895 A1 WO 2023087895A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- certificate
- random data
- server
- parameters
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 62
- 238000012795 verification Methods 0.000 claims abstract description 40
- 238000010276 construction Methods 0.000 claims description 37
- 238000004590 computer program Methods 0.000 claims description 16
- 238000007726 management method Methods 0.000 description 14
- 238000005516 engineering process Methods 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006978 adaptation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000004984 smart glass Substances 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
Definitions
- the present disclosure relates to the technical field of authentication, and in particular to a device authentication method and system, an Internet of Things device, and an authentication server.
- the IoT platform can obtain key information (such as keys) of devices and/or users sent by IoT devices, and then perform trustworthy management of IoT devices based on the above key information. letter authentication.
- the authentication method in the related art requires the IoT device to send its key information to the authentication server of the IoT platform, because the IoT device and the authentication server are connected through the Internet (that is, the public network), resulting in the above key information being in the process of transmission or interaction. Leakage of key information.
- the present disclosure provides a device authentication method and system, an Internet of Things device and an authentication server, so as to solve the deficiencies of related technologies.
- a device authentication method which is applied to an Internet of Things device, and the method includes:
- the authentication result returned by the authentication server is obtained.
- said obtaining random data includes:
- the second random data is used as the obtained random data; otherwise, it is determined that no random data has been received.
- the obtaining public input parameters including the random data, and generating an authentication certificate according to preset certification parameters and the public input parameters include:
- the device certificate and the random data as the public input parameters, and inputting the public input parameters into a preset zero-knowledge proof circuit to obtain a solution vector of the zero-knowledge proof circuit;
- the method further includes the step of acquiring the preset certification parameters, specifically including:
- the build server Send a build request including key device information to the build server, so that the build server generates a device certificate and certification parameters corresponding to the device certificate according to the device key information;
- the device key information includes a device number, a key, and a device type;
- a device authentication method applied to a construction server comprising:
- the key device information includes a device number sn, a key sk, and a device type ct;
- said obtaining the proof parameters of the zero-knowledge proof circuit according to the key information of the device includes:
- the device certificate is represented by a first polynomial C (sn, sk, ct);
- the method further includes:
- a device authentication method applied to an authentication server comprising:
- the authentication certificate sent by the IoT device; the authentication certificate is generated by the IoT device based on random data;
- the method before obtaining the authentication certificate sent by the IoT device, the method further includes:
- a device authentication system comprising: at least one IoT device, a construction server, an authentication server, and a management server;
- the management server is configured to generate a key according to the registration request of the IoT device to register the IoT device;
- the construction server is used to generate proof parameters and verification parameters corresponding to the zero-knowledge proof circuit according to the construction request of the Internet of Things device, and send the proof parameters to the Internet of Things device and the authentication server;
- the IoT device is used to generate an authentication certificate according to random data and preset certificate parameters and send it to the authentication server;
- the authentication server is configured to authenticate the IoT device according to the verification certificate and the authentication certificate, and obtain an authentication result.
- an Internet of Things device including:
- memory for storing a computer program executable by said processor
- the processor is configured to execute the computer program in the memory, so as to realize the above-mentioned method.
- a server including:
- memory for storing a computer program executable by said processor
- the processor is configured to execute the computer program in the memory, so as to realize the above-mentioned method.
- a computer non-transitory readable storage medium when the executable computer program in the storage medium is executed by a processor, the above method can be implemented.
- random data can be obtained in the scheme provided by the embodiments of the present disclosure; public input parameters including the random data can be obtained, and authentication certificates can be generated according to preset certification parameters and the public input parameters;
- the certificate is sent to the authentication server, so that the authentication server verifies the authentication certificate according to the preset verification parameters to obtain an authentication result; and the authentication result returned by the authentication server is obtained.
- this embodiment can use the authentication certificate instead of the key information of the device for authentication, thereby improving authentication security; moreover, the authentication server cannot restore the key information of the device based on the above authentication certificate, further avoiding the leakage of key information of the device and improving information security.
- Fig. 1 is a block diagram of a device authentication system according to an exemplary embodiment.
- Fig. 2 is a flowchart showing the interaction between devices in the device authentication system according to an exemplary embodiment.
- Fig. 3 is a flow chart showing a device authentication method according to an exemplary embodiment.
- Fig. 4 is a flow chart of obtaining certification parameters and device certificates according to an exemplary embodiment.
- Fig. 5 is a flow chart of obtaining an authentication certificate according to an exemplary embodiment.
- Fig. 6 is a flow chart showing another device authentication method according to an exemplary embodiment.
- Fig. 7 is a flow chart showing another device authentication method according to an exemplary embodiment.
- Fig. 8 is a block diagram of a server according to an exemplary embodiment.
- the IoT platform can obtain key information (such as keys) of devices and/or users sent by IoT devices, and then perform trustworthy management of IoT devices based on the above key information. letter authentication.
- the authentication method in the related art requires the IoT device to send its key information to the authentication server of the IoT platform, because the IoT device and the authentication server are connected through the Internet (that is, the public network), resulting in the above key information being in the process of transmission or interaction. Leakage of key information.
- the above-mentioned device authentication system may include at least one IoT device, a construction server, an authentication server, and a management server.
- each IoT device communicates with the construction server, the authentication server, and the management server respectively, and the construction server, the authentication server, and the management server communicate with each other.
- the management server is used to generate a key according to the registration request of the IoT device to register the IoT device;
- the construction server is used to generate proof parameters and verification parameters corresponding to the zero-knowledge proof circuit according to the construction request of the IoT device, and send the certification parameters to the IoT device and the authentication server;
- the IoT device is used to generate an authentication certificate based on random data and preset certification parameters and send it to the authentication server;
- the authentication server is used to The authentication certificate and the authentication certificate are used to authenticate the IoT device, and obtain an authentication result.
- the following embodiments will describe the working process of the device authentication system according to the role of each device and server in the device authentication system in the device authentication process.
- the construction server and management server can be realized by the same server
- the authentication server can be a third-party server
- IoT devices can include various smart devices, such as smart watches, smart bracelets, smart glasses and other smart wearable devices, air Purifiers, sweeping robots, smart lamps and other smart homes, etc.
- Fig. 2 is a flow chart of interaction between devices in a device authentication system according to an exemplary embodiment
- Fig. 3 is a flow chart of a device authentication method according to an exemplary embodiment, see Fig. 2 and Fig. 3 , a device authentication method that can be applied to IoT devices, including steps 31 to 34.
- step 31 random data is obtained.
- the IoT device can obtain random data, and the above random data comes from the authentication server.
- the IoT device may send an authentication request to the authentication server, and the authentication request is used to request the authentication server to authenticate the IoT device.
- the authentication request in this example also includes random data (hereinafter referred to as the first random data to show the difference). Generated by a random number generation algorithm.
- the authentication server may obtain the first random data in the authentication request after receiving the authentication request. Then, the authentication server can use a preset encryption algorithm (such as MD5, SHA1, HMAC algorithm, etc.) to encrypt the first random data to obtain encrypted data, and send the encrypted data to the IoT device.
- the Internet of Things device can use a preset decoding algorithm (such as MD5, SHA1, HMAC algorithm, etc.) to decrypt the above encrypted data to obtain the second random data.
- the above-mentioned encryption algorithm and decoding algorithm can appear in pairs, that is, the data encrypted by a preset encryption algorithm can be decoded by the same pair of decoding algorithm to decode the original data, thereby ensuring the security of data transmission.
- Technicians can select appropriate encryption algorithms and decryption algorithms according to specific scenarios, which are not limited here.
- the IoT device can compare the first random data with the second random data, and when the second random data is consistent with the first random data, the IoT device can determine that the above-mentioned authentication server is legal, and at this time, the second random data can be data as obtained random data; otherwise, it can be determined that the authentication server is illegal, and the IoT device can determine that no random data has been received.
- the consistency between the first random data and the second random data means that the two are the same or match, where the matching means that the second random data is the first random data after certain rules (for example, the subsequent random data) Generated by the number generation algorithm R(r), the second random data and the first random data are mapped one by one.
- the subsequent random number r is regarded as the first random data and the value R(r) of the random number generation algorithm R As the second random data, r coincides with R(r).
- step 32 public input parameters including the random data are obtained, and an authentication certificate is generated according to preset certification parameters and the public input parameters.
- preset certification parameters may be stored in the IoT device, as shown in FIG. 4 , including steps 41 and 42 .
- the IoT device may send a construction request including key device information to the construction server, so that the construction server generates a device certificate and certification parameters corresponding to the device certificate according to the above key device information.
- the build server can define a polynomial C(sn, sk, ct) that generates the device certificate (cert) of the IoT device ).
- the construction server may define a random number generation algorithm R(r), whose input parameter is random data (r).
- R(r) the above random data r comes from the Internet of Things device, that is, the first random data exemplified in step 31 .
- the build server can transform the device authentication problem into a polynomial like this:
- the build server can compile the polynomial F(sn,sk,ct,r) into a circuit, that is, a zero-knowledge proof circuit.
- the zero-knowledge proof circuit can be composed of several gates, such as addition gates and multiplication gates, each gate has several input pins and several output pins; each gate can perform an addition or multiplication operation. Then in each proof process, the value on the connection line of each gate can be obtained, and by verifying whether the input and output values of each gate satisfy the addition or multiplication equation, it can be determined that an object (such as an Internet of Things device) participates in proving process.
- the above-mentioned zero-knowledge proof circuit can be a library or an executable program, so as to facilitate porting to IoT devices.
- the construction server can use the device number sn, device certificate cert and random data r as public input parameters to generate the proof parameter pk and verification parameter vk of the above zero-knowledge proof circuit.
- the proof parameter pk can be sent to the IoT device.
- the verification parameter vk and the device certificate are sent to the management server, and forwarded to the authentication server by the management server.
- the device certificate of the IoT device can be obtained from the construction server, or can be generated by the IoT device itself according to the key sk, device number sn and device type ct, which is not limited in this disclosure.
- solutions of various embodiments are described by taking the device certificate generated by the IoT device itself as an example.
- the IoT device may obtain the certification parameters sent by the construction server. That is, the IoT device obtains preset certification parameters and stores them in a specified location (such as local storage or cache).
- the Internet of Things device can obtain the authentication certificate, as shown in FIG. 5 , including steps 51 to 53.
- the IoT device may obtain the device ID and device certificate of the IoT device.
- the IoT device can input the device number, device certificate and random data into the preset zero-knowledge proof circuit to obtain a solution vector of the zero-knowledge proof circuit.
- the solution vector is the intermediate data of the proof process, which may include public input parameters and private input parameters.
- the IoT device can input the solution vector (or private input parameters in the solution vector) and proof parameters into a preset zero-knowledge proof algorithm (such as ZKP algorithm or zk-SNARK algorithm), and obtain the preset
- a preset zero-knowledge proof algorithm such as ZKP algorithm or zk-SNARK algorithm
- the output data of the zero-knowledge proof algorithm is used as the authentication proof.
- the authentication certificate can be used to replace the key device information of the IoT device, so as not to cause information leakage and ensure the safety of the key device.
- step 33 the authentication certificate is sent to the authentication server, so that the authentication server verifies the authentication certificate according to preset verification parameters to obtain an authentication result.
- the IoT device may send the authentication certificate to the authentication server.
- the zero-knowledge proof algorithm is stored in the authentication server.
- the device number, device certificate, verification parameters and random data (such as the above-mentioned first random data or random data consistent with the first random data) can be input into the above-mentioned zero-knowledge proof algorithm, and obtain the verification data output by the zero-knowledge proof algorithm.
- the authentication server can authenticate the IoT device according to the verification certificate and the authentication certificate. For example, when the verification certificate is the same as the authentication certificate, it is determined that the authentication result is true, indicating that the authentication is successful; when the verification certificate is different from the authentication certificate, it is determined that the authentication result is false. Indicates that the authentication failed. That is, the authentication server can determine whether the authentication succeeds or fails.
- step 34 the authentication result returned by the authentication server is obtained.
- the Internet of Things device can obtain the authentication result returned by the authentication server, and perform corresponding operations according to the above authentication results, such as accessing the Internet of Things platform, communicating with the Internet of Things platform, etc., and can set corresponding operations according to specific scenarios. This is not limited.
- random data can be obtained; public input parameters including the random data can be obtained, and an authentication certificate can be generated according to the preset certification parameters and the public input parameters; the authentication certificate can be sent to the authentication server, so that the authentication server verifies the authentication certificate according to preset verification parameters to obtain an authentication result; and obtains the authentication result returned by the authentication server.
- this embodiment can use the authentication certificate instead of the key information of the device for authentication, thereby improving authentication security; moreover, the authentication server cannot restore the key information of the device based on the above authentication certificate, further avoiding the leakage of key information of the device and improving information security.
- FIG. 6 is a flow chart of a device authentication method according to an exemplary embodiment.
- a device authentication method can be applied to a construction server, including steps 61 to 63 .
- step 61 the construction request sent by the Internet of Things device and including the key information of the device is obtained; the key information of the device includes the device number sn, the key sk and the device type ct.
- the construction server may communicate with the IoT device to obtain a construction request sent by the IoT device, and the above construction request may include key information of the device.
- the above-mentioned device key information includes device number sn, key sk and device type ct.
- step 62 the proof parameters of the zero-knowledge proof circuit are obtained according to the key information of the device.
- the construction server may obtain the proof parameters of the zero-knowledge proof circuit according to the key information of the device.
- the build server can define the first polynomial C(sn, sk, ct).
- the construction server may define a random number generation algorithm R(r), whose input parameter is random data (r).
- R(r) the above random data r comes from the Internet of Things device, that is, the first random data exemplified in step 31 .
- the build server can transform the device authentication problem into the following second polynomial F(sn,sk,ct,r):
- the construction server can compile the second polynomial F(sn, sk, ct, r) into a circuit, that is, a zero-knowledge proof circuit.
- the zero-knowledge proof circuit can be composed of several gates, such as addition gates and multiplication gates, each gate has several input pins and several output pins; each gate can perform an addition or multiplication operation. Then in each proof process, the value on the connection line of each gate can be obtained, and by verifying whether the input and output values of each gate satisfy the addition or multiplication equation, it can be determined that an object (such as an Internet of Things device) participates in proving process.
- the above-mentioned zero-knowledge proof circuit can be a library or an executable program, so as to facilitate porting to IoT devices.
- the construction server can use the device number sn, device certificate cert and random data r as public input parameters to generate the proof parameter pk and verification parameter vk of the above zero-knowledge proof circuit.
- the proof parameter pk can be sent to the IoT device.
- the verification parameter vk and the device certificate are sent to the authentication server, and the authentication server authenticates the IoT device according to the verification parameter, the device certificate and the authentication certificate sent by the IoT device.
- step 63 the proof parameter is sent to the IoT device, so that the IoT device generates an authentication proof according to the proof parameter, the device key information and the zero-knowledge proof circuit for authentication.
- the key information of the device (device number sn, key sk, and device type ct) can be converted by the construction server into a device certificate and verification parameters and sent to the authentication server, thereby preventing the authentication server from obtaining information such as the key sk , to avoid leakage of key information and improve information security.
- Fig. 7 is a flow chart of a device authentication method according to an exemplary embodiment. Referring to Fig. 7, a device authentication method can be applied to an authentication server, including steps 71 to 73.
- step 71 the authentication certificate sent by the Internet of Things device is acquired; the authentication certificate is generated by the Internet of Things device based on random data.
- the authentication server can communicate with the IoT device to obtain the authentication certificate sent by the IoT device.
- How the IoT device generates the authentication certificate can refer to the content of the embodiment shown in FIG. 3 , which will not be repeated here.
- step 72 a verification certificate is generated according to preset verification parameters, the device certificate of the IoT device and the random data.
- the authentication server can generate a verification certificate according to the preset verification parameters, the device certificate of the IoT device, the device number and random data, where the device number, random data and device certificate are the public input parameters mentioned above .
- How the authentication server generates the verification certificate can refer to the content of step 33 in the embodiment shown in FIG. 3 , which will not be repeated here.
- step 73 the IoT device is authenticated according to the verification certificate and the authentication certificate, and an authentication result is obtained.
- the content of step 33 which will not be repeated here.
- the authentication server only needs to obtain the device number and authentication certificate of the IoT device to authenticate it, and does not need key information such as keys to authenticate, thereby avoiding information leakage and improving information security.
- an Internet of Things device including:
- memory for storing a computer program executable by said processor
- the processor is configured to execute the computer program in the memory, so as to realize the method as shown in FIG. 3 .
- a server which may be a management server, an authentication server or a construction server shown in FIG. 1 , referring to FIG. 8 , including:
- memory 82 for storing computer programs executable by said processor
- the processor is configured to execute the computer program in the memory, so as to realize the methods as shown in FIG. 6 and FIG. 7 .
- a computer non-transitory readable storage medium such as a memory including an executable computer program
- the above-mentioned executable computer program can be executed by a processor, so as to realize the and the method of the embodiment shown in FIG. 7 .
- the readable storage medium may be ROM, random access memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device and the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本公开是关于一种设备认证方法和系统、物联网设备和认证服务器。该方法包括:获取随机数据;获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明;将所述认证证明发送给认证服务器,以使所述认证服务器根据预设的验证参数对所述认证证明进行验证得到认证结果;获得所述认证服务器返回的认证结果。本实施例可以利用认证证明而无需利用设备关键信息进行认证,提高认证安全;并且,认证服务器无法根据上述认证证明还原出设备关键信息,进一步避免设备关键信息泄漏,提高信息安全。
Description
本公开涉及认证技术领域,尤其涉及一种设备认证方法和系统、物联网设备和认证服务器。
随着物联网相关技术的发展,物联网平台中接入的物联网设备也急剧增加,并且其身份也更加复杂。因此,相关技术中对物联网设备进行可信管理,例如物联网平台可以获取物联网设备发送的设备和/或用户的关键信息(如密钥),然后根据上述关键信息对物联网设备进行可信认证。
然而,相关技术中的认证方法需要物联网设备将其关键信息发送给物联网平台的认证服务器,因物联网设备和认证服务器通过互联网(即公网)连接,导致上述关键信息在传输或交互过程中造成关键信息泄露。
发明内容
本公开提供一种设备认证方法和系统、物联网设备和认证服务器,以解决相关技术的不足。
根据本公开实施例的第一方面,提供一种设备认证方法,应用于物联网设备,所述方法包括:
获取随机数据;
获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明;
将所述认证证明发送给认证服务器,以使所述认证服务器根据预设的验证参数对所述认证证明进行验证得到认证结果;
获得所述认证服务器返回的认证结果。
可选地,所述获取随机数据,包括:
生成一个第一随机数据并将所述第一随机数据发送给所述认证服务器,以使所述认 证服务器利用预设的加密算法对所述第一随机数据进行加密生成加密数据,并将所述加密数据发送给所述物联网设备;
获取所述加密数据并利用预设的解密算法对所述加密数据进行解密获得第二随机数据;
当所述第二随机数据与所述第一随机数据相一致时,将所述第二随机数据作为获得的随机数据;否则,确定未接收到随机数据。
可选地,所述获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明,包括:
获取所述物联网设备的设备号和设备证书;
将所述设备号、所述设备证书和所述随机数据作为所述公共输入参数,并将所述公共输入参数输入到预设的零知识证明电路,获得所述零知识证明电路的解向量;
将所述解向量和所述证明参数输入到预设的零知识证明算法,获得所述零知识证明算法输出的所述认证证明。
可选地,所述方法还包括获取所述预设的证明参数的步骤,具体包括:
向构建服务器发送包括设备关键信息的构建请求,以使所述构建服务器根据所述设备关键信息生成设备证书、所述设备证书对应的证明参数;所述设备关键信息包括设备号、密钥和设备类型;
获取所述构建服务器发送的证明参数,得到所述预设的证明参数。
根据本公开实施例的第二方面,提供一种设备认证方法,应用于构建服务器,所述方法包括:
获取物联网设备发送的包括设备关键信息的构建请求;所述设备关键信息包括设备号sn、密钥sk和设备类型ct;
根据所述设备关键信息获取零知识证明电路的证明参数;
将所述证明参数发送给所述物联网设备,以使所述物联网设备根据所述证明参数、所述设备关键信息和所述零知识证明电路生成认证证明进行认证。
可选地,所述根据所述设备关键信息获取零知识证明电路的证明参数,包括:
根据所述设备关键信息生成所述物联网设备的设备证书;所述设备证书采用第一多 项式C(sn,sk,ct)表示;
基于预设的随机数据生成算法,获取与所述第一多项式相匹配的第二多项式F(sn,sk,ct,r);
将所述第二多项式编译成零知识证明电路,并获取所述零知识证明电路的证明参数。
可选地,所述将所述第二多项式编译成零知识证明电路之后,所述方法还包括:
获取所述零知识证明电路的验证参数;
将所述验证参数和所述设备证书发送给认证服务器,以使所述认证服务器根据所述验证参数、所述设备证书和所述物联网设备发送的认证证明对所述物联网设备进行认证。
根据本公开实施例的第三方面,提供一种设备认证方法,应用于认证服务器,所述方法包括:
获取物联网设备发送的认证证明;所述认证证明由所述物联网设备基于随机数据生成;
根据预设的验证参数、所述物联网设备的设备证书和所述随机数据生成验证证明;
根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。
可选地,所述获取物联网设备发送的认证证明之前,所述方法还包括:
获取所述物联网设备发送的第一随机数据;
利用预设的加密算法对所述第一随机数据进行加密生成加密数据;
将所述加密数据发送给所述物联网设备,以使所述物联网设备对所述加密数据进行解密以验证认证服务器是否合法。
根据本公开实施例的第四方面,提供一种设备认证系统,所述系统包括:至少一个物联网设备、构建服务器、认证服务器和管理服务器;
所述管理服务器用于根据所述物联网设备的注册请求生成密钥以对所述物联网设备进行注册;
所述构建服务器用于根据所述物联网设备的构建请求生成零知识证明电路对应的证明参数和验证参数,并将所述证明参数发送给所述物联网设备和所述认证服务器;
所述物联网设备用于根据随机数据和预设的证明参数生成认证证明并发送给所述认证服务器;
所述认证服务器用于根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。
根据本公开实施例的第五方面,提供一种物联网设备,包括:
处理器;
用于存储所述处理器可执行的计算机程序的存储器;
其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如上述的方法。
根据本公开实施例的第六方面,提供一种服务器,包括:
处理器;
用于存储所述处理器可执行的计算机程序的存储器;
其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如上述的方法。
根据本公开实施例的第七方面,提供一种计算机非瞬态可读存储介质,当所述存储介质中的可执行的计算机程序由处理器执行时,能够实现如上述的方法。
本公开的实施例提供的技术方案可以包括以下有益效果:
由上述实施例可知,本公开实施例提供的方案中可以获取随机数据;获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明;将所述认证证明发送给所述认证服务器,以使所述认证服务器根据预设的验证参数对认证证明进行验证得到认证结果;获得所述认证服务器返回的认证结果。这样,本实施例可以利用认证证明而无需利用设备关键信息进行认证,提高认证安全;并且,认证服务器无法根据上述认证证明还原出设备关键信息,进一步避免设备关键信息泄漏,提高信息安全。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本公开的实施例,并与说明书一起用于解释本公开的原理。
图1是根据一示例性实施例示出的一种设备认证系统的框图。
图2是根据一示例性实施例示出的设备认证系统中各设备交互的流程图。
图3是根据一示例性实施例示出的一种设备认证方法的流程图。
图4是根据一示例性实施例示出的一种获取证明参数和设备证书的流程图。
图5是根据一示例性实施例示出的一种获取认证证明的流程图。
图6是根据一示例性实施例示出的另一种设备认证方法的流程图。
图7是根据一示例性实施例示出的又一种设备认证方法的流程图。
图8是根据一示例性实施例示出的一种服务器的框图。
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性所描述的实施例并不代表与本公开相一致的所有实施例。相反,它们仅是与如所附权利要求书中所详述的、本公开的一些方面相一致的装置例子。需要说明的是,在不冲突的情况下,下述的实施例及实施方式中的特征可以相互组合。
随着物联网相关技术的发展,物联网平台中接入的物联网设备也急剧增加,并且其身份也更加复杂。因此,相关技术中对物联网设备进行可信管理,例如物联网平台可以获取物联网设备发送的设备和/或用户的关键信息(如密钥),然后根据上述关键信息对物联网设备进行可信认证。
然而,相关技术中的认证方法需要物联网设备将其关键信息发送给物联网平台的认证服务器,因物联网设备和认证服务器通过互联网(即公网)连接,导致上述关键信息在传输或交互过程中造成关键信息泄露。
为解决上述技术问题,本公开实施例提供了一种设备认证方法和一种设备认证系统。参见图1,上述设备认证系统可以包括至少一个物联网设备、构建服务器、认证服务器和管理服务器。其中,每个物联网设备分别与构建服务器、认证服务器和管理服务器通信连接,构建服务器、认证服务器和管理服务器各自相互通信。其中,
管理服务器用于根据物联网设备的注册请求生成密钥以对所述物联网设备进行注册;构建服务器用于根据所述物联网设备的构建请求生成零知识证明电路对应的证明参数和验证参数,并将所述证明参数发送给所述物联网设备和所述认证服务器;物联网设备 用于根据随机数据和预设的证明参数生成认证证明并发送给所述认证服务器;认证服务器用于根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。
考虑到上述设备认证方法是基于上述设备认证系统实现,后续实施例中将按照设备认证系统中的每个设备和服务器在设备认证过程中体现的作用描述设备认证系统的工作过程。
实际应用中,构建服务器和管理服务器可以采用同一个服务器实现,认证服务器可以是第三方服务器,物联网设备可以包括各种智能设备,例如智能手表、智能手环、智能眼镜等智能穿戴设备,空气净化器、扫地机器人、智能灯具等智能家居,等等。
图2是根据一示例性实施例示出的一种设备认证系统中各设备交互的流程图,图3是根据一示例性实施例示出的一种设备认证方法的流程图,参见图2和图3,一种设备认证方法,可以应用于物联网设备,包括步骤31~步骤34。
在步骤31中,获取随机数据。
本实施例中,物联网设备可以获取随机数据,上述随机数据来自认证服务器。
当有认证的需求时,物联网设备可以向认证服务器发送认证请求,该认证请求用于请求认证服务器对物联网设备进行认证。可理解的是,除了认证过程所需要的设备信息外,本示例的认证请求中还包括随机数据(后续称之为第一随机数据以示区别),上述第一随机数据是物联网设备利用预设的随机数生成算法来生成的。
本示例中,认证服务器在接收到上述认证请求后可以获取认证请求内的第一随机数据。然后,认证服务器可以利用预设的加密算法(如MD5、SHA1、HMAC算法等)对第一随机数据进行加密获得加密数据,并将上述加密数据发送给物联网设备。物联网设备可以利用预设的解码算法(如MD5、SHA1、HMAC算法等)对上述加密数据进行解密,获得第二随机数据。
需要说明的是,上述加密算法和解码算法可以成对出现,即利用预设的加密算法加密的数据可以由同一对的解码算法解码出来原始数据,从而保证数据传输的安全性。技术人员可以根据具体场景选择合适的加密算法和解密算法,在此不作限定。
需要说明的是,由于认证服务器并非全部是合法的,因此其解密出的随机数据并非全部是第一随机数据,故此称之为第二随机数据以区别于第一随机数据。
之后,物联网设备可以对比第一随机数据和第二随机数据,当第二随机数据与第一 随机数据相一致时,物联网设备可以确定上述认证服务器是合法的,此时可以将第二随机数据作为获得的随机数据;否则可以确定认证服务器是非法的,物联网设备可以确定未接收到随机数据。
需要说明的是,第一随机数据和第二随机数据相一致是指两者相同或者相匹配,其中相匹配是指第二随机数据是对第一随机数据经过一定的规则(例如后续出现的随机数生成算法R(r)生成的,第二随机数据与第一随机数据两者一一映射。例如后续出现的随机数r看成第一随机数据且随机数生成算法R的值R(r)作为第二随机数据,r与R(r)相一致。
在步骤32中,获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明。
本实施例中,物联网设备内可以存储预设的证明参数,参见图4,包括步骤41和步骤42。在步骤41中,物联网设备可以向构建服务器发送包括设备关键信息的构建请求,以使构建服务器根据上述设备关键信息生成设备证书、所述设备证书对应的证明参数。
以设备关键信息可以包括设备号(sn)、设备秘钥(sk)和设备类型(ct)为例,构建服务器可以定义生成物联网设备的设备证书(cert)的多项式C(sn,sk,ct)。并且,构建服务器可以定义随机数生成算法R(r),其输入参数为随机数据(r)。其中,上述随机数据r来自于物联网设备,即步骤31中所示例的第一随机数据。构建服务器可以将设备认证问题转换成如下多项式:
F(sn,sk,ct,r)=C(sn,sk,ct)R(r)。
然后,构建服务器可以将多项式F(sn,sk,ct,r)编译成电路,即零知识证明电路。其中,零知识证明电路可以由若干个门组成,例如加法门和乘法门,每个门有数个输入引脚和数个输出引脚;每个门可以作一次加法或者乘法运算。那么在每次证明过程中可以获得每个门的连接线上的值,通过验证每个门的输入和输出值是否满足加法或者乘法等式即可确定某个对象(如物联网设备)参与了证明过程。实际应用中,上述零知识证明电路可以是一个库或者可执行程序,从而方便移植到物联网设备中。
之后,构建服务器可以将设备号sn、设备证书cert和随机数据r作为公共输入参数生成上述零知识证明电路的证明参数pk和验证参数vk。其中,证明参数pk可以发送给物联网设备。验证参数vk和设备证书发送给管理服务器,并由管理服务器转发给认证服务器。
需要说明的是,物联网设备的设备证书可以从构建服务器处获取,也可以由物联网设备自身根据密钥sk、设备号sn和设备类型ct生成,本公开不作限定。本公开中以物联网设备自身生成设备证书为例描述各实施例的方案。
在步骤42中,物联网设备可以获取构建服务器发送的证明参数。即物联网设备获得预设的证明参数,并存储到指定位置(如本地存储器或者缓存)。
本实施例中,在获得证明参数和随机数据之后,物联网设备可以获得认证证明,参见图5,包括步骤51~步骤53。在步骤51中,物联网设备可以获取物联网设备的设备号和设备证书。在步骤52中,物联网设备可以将设备号、设备证书和随机数据输入到预设的零知识证明电路,获得零知识证明电路的解向量。其中解向量是证明过程的中间数据,其可以包括公共输入参数和私有输入参数。在步骤53中,物联网设备可以将解向量(或者解向量中的私有输入参数)和证明参数输入到预设的零知识证明算法(例如ZKP算法或者zk-SNARK算法),并获得预设的零知识证明算法的输出数据,将所述输出数据作为认证证明。这样,本示例中可以采用认证证明来替代物联网设备的设备关键信息,从而不会引起信息泄露,保证设备关键设备的安全。
在步骤33中,将所述认证证明发送给认证服务器,以使所述认证服务器根据预设的验证参数对所述认证证明进行验证得到认证结果。
本实施例中,物联网设备可以将上述认证证明发送给认证服务器。认证服务器内存储零知识证明算法,此时可以将设备号、设备证书、验证参数和随机数据(如上述的第一随机数据或者将第一随机数据相一致的随机数据)输入到上述零知识证明算法,并获得零知识证明算法输出的验证数据。然后认证服务器可以根据验证证明和认证证明对物联网设备进行认证,例如当验证证明与认证证明相同时确定认证结果为真,表示认证成功;当验证证明与认证证明不同时确定认证结果为假,表示认证失败。即认证服务器可以确定出认证成功或者失败的认证结果。
在步骤34中,获得所述认证服务器返回的认证结果。
本实施例中,物联网设备可以获得认证服务器返回的认证结果,并根据上述认证结果执行相应的操作,例如接入物联网平台,与物联网平台通信等,可以根据具体场景设置相应操作,在此不作限定。
至此,本公开实施例提供的方案中可以获取随机数据;获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明;将所述认证证明 发送给认证服务器,以使所述认证服务器根据预设的验证参数对所述认证证明进行验证得到认证结果;获得所述认证服务器返回的认证结果。这样,本实施例可以利用认证证明而无需利用设备关键信息进行认证,提高认证安全;并且,认证服务器无法根据上述认证证明还原出设备关键信息,进一步避免设备关键信息泄漏,提高信息安全。
图6是根据一示例性实施例示出的一种设备认证方法的流程图,参见图6,一种设备认证方法,可以应用于构建服务器,包括步骤61~步骤63。
在步骤61中,获取物联网设备发送的包括设备关键信息的构建请求;所述设备关键信息包括设备号sn、密钥sk和设备类型ct。
本实施例中,构建服务器可以与物联网设备通信,获得物联网设备发送的构建请求,上述构建请求可以包括设备关键信息。其中,上述设备关键信息包括设备号sn、密钥sk和设备类型ct。
在步骤62中,根据所述设备关键信息获取零知识证明电路的证明参数。
本实施例中,构建服务器可以根据所述设备关键信息获取零知识证明电路的证明参数。以设备关键信息包括设备号(sn)、设备秘钥(sk)和设备类型(ct)为例,构建服务器可以定义生成物联网设备的设备证书(cert)的第一多项式C(sn,sk,ct)。并且,构建服务器可以定义随机数生成算法R(r),其输入参数为随机数据(r)。其中,上述随机数据r来自于物联网设备,即步骤31中所示例的第一随机数据。构建服务器可以将设备认证问题转换成如下第二多项式F(sn,sk,ct,r):
F(sn,sk,ct,r)=C(sn,sk,ct)R(r)。
然后,构建服务器可以将第二多项式F(sn,sk,ct,r)编译成电路,即零知识证明电路。其中,零知识证明电路可以由若干个门组成,例如加法门和乘法门,每个门有数个输入引脚和数个输出引脚;每个门可以作一次加法或者乘法运算。那么在每次证明过程中可以获得每个门的连接线上的值,通过验证每个门的输入和输出值是否满足加法或者乘法等式即可确定某个对象(如物联网设备)参与了证明过程。实际应用中,上述零知识证明电路可以是一个库或者可执行程序,从而方便移植到物联网设备中。
之后,构建服务器可以将设备号sn、设备证书cert和随机数据r作为公共输入参数生成上述零知识证明电路的证明参数pk和验证参数vk。其中,证明参数pk可以发送给物联网设备。验证参数vk和设备证书发送给认证服务器,以认证服务器根据所述验证参数、设备证书和物联网设备发送的认证证明对物联网设备进行认证。
在步骤63中,将所述证明参数发送给所述物联网设备,以使所述物联网设备根据所述证明参数、所述设备关键信息和所述零知识证明电路生成认证证明进行认证。
至此,本实施例中可以由构建服务器将设备关键信息(设备号sn、密钥sk和设备类型ct)转换成设备证书和和验证参数发送给认证服务器,从而避免认证服务器获取密钥sk等信息,避免关键信息泄漏,提高信息安全。
图7是根据一示例性实施例示出的一种设备认证方法的流程图,参见图7,一种设备认证方法,可以应用于认证服务器,包括步骤71~步骤73。
在步骤71中,获取物联网设备发送的认证证明;所述认证证明由所述物联网设备基于随机数据生成。
本实施例中,认证服务器可以与物联网设备通信,获得物联网设备发送的认证证明。其中物联网设备如何生成认证证明可以参见图3所示实施例的内容,在此不再赘述。
在步骤72中,根据预设的验证参数、所述物联网设备的设备证书和所述随机数据生成验证证明。
本实施例中,认证服务器可以根据预设的验证参数、物联网设备的设备证书、设备号和随机数据生成验证证明,其中设备号、随机数据和设备证书即是上文中所说的公共输入参数。其中认证服务器如何生成验证证明可以参见图3所示实施例中步骤33的内容,在此不再赘述。
在步骤73中,根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。具体可以参见步骤33的内容,在此不再赘述。
至此,本实施例中认证服务器可以仅需要获取到物联网设备的设备号和认证证明即可对其认证,无需如密钥等关键信息即可认证,避免了信息泄漏,从而提高信息安全。
在示例性实施例中,还提供了一种物联网设备,包括:
处理器;
用于存储所述处理器可执行的计算机程序的存储器;
其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如图3所述的方法。
在示例性实施例中,还提供了一种服务器,可以是图1中所示的管理服务器、认证服务器或者构建服务器,参见图8,包括:
处理器81;
用于存储所述处理器可执行的计算机程序的存储器82;
其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如图6和图7所述的方法。
在示例性实施例中,还提供了一种计算机非瞬态可读存储介质,例如包括可执行的计算机程序的存储器,上述可执行的计算机程序可由处理器执行,以实现如图3、图6和图7所示实施例的方法。其中,可读存储介质可以是ROM、随机存取存储器(RAM)、CD-ROM、磁带、软盘和光数据存储设备等。
本领域技术人员在考虑说明书及实践这里公开的公开后,将容易想到本公开的其它实施方案。本公开旨在涵盖任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由下面的权利要求指出。
应当理解的是,本公开并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本公开的范围仅由所附的权利要求来限制。
Claims (13)
- 一种设备认证方法,其特征在于,应用于物联网设备,所述方法包括:获取随机数据;获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明;将所述认证证明发送给认证服务器,以使所述认证服务器根据预设的验证参数对所述认证证明进行验证得到认证结果;获得所述认证服务器返回的认证结果。
- 根据权利要求1所述的方法,其特征在于,所述获取随机数据,包括:生成一个第一随机数据并将所述第一随机数据发送给所述认证服务器,以使所述认证服务器利用预设的加密算法对所述第一随机数据进行加密生成加密数据,并将所述加密数据发送给所述物联网设备;获取所述加密数据并利用预设的解密算法对所述加密数据进行解密获得第二随机数据;当所述第二随机数据与所述第一随机数据相一致时,将所述第二随机数据作为获得的随机数据;否则,确定未接收到随机数据。
- 根据权利要求1所述的方法,其特征在于,所述获取包括所述随机数据的公共输入参数,根据预设的证明参数和所述公共输入参数生成认证证明,包括:获取所述物联网设备的设备号和设备证书;将所述设备号、所述设备证书和所述随机数据作为所述公共输入参数,并将所述公共输入参数输入到预设的零知识证明电路,获得所述零知识证明电路的解向量;将所述解向量和所述证明参数输入到预设的零知识证明算法,获得所述零知识证明算法输出的所述认证证明。
- 根据权利要求1~3任一项所述的方法,其特征在于,所述方法还包括获取所述预设的证明参数的步骤,具体包括:向构建服务器发送包括设备关键信息的构建请求,以使所述构建服务器根据所述设备关键信息生成设备证书、所述设备证书对应的证明参数;所述设备关键信息包括设备号、密钥和设备类型;获取所述构建服务器发送的证明参数,得到所述预设的证明参数。
- 一种设备认证方法,其特征在于,应用于构建服务器,所述方法包括:获取物联网设备发送的包括设备关键信息的构建请求;所述设备关键信息包括设备 号sn、密钥sk和设备类型ct;根据所述设备关键信息获取零知识证明电路的证明参数;将所述证明参数发送给所述物联网设备,以使所述物联网设备根据所述证明参数、所述设备关键信息和所述零知识证明电路生成认证证明进行认证。
- 根据权利要求5所述的方法,其特征在于,所述根据所述设备关键信息获取零知识证明电路的证明参数,包括:根据所述设备关键信息生成所述物联网设备的设备证书;所述设备证书采用第一多项式C(sn,sk,ct)表示;基于预设的随机数据生成算法,获取与所述第一多项式相匹配的第二多项式F(sn,sk,ct,r);将所述第二多项式编译成零知识证明电路,并获取所述零知识证明电路的证明参数。
- 根据权利要求6所述的方法,其特征在于,所述将所述第二多项式编译成零知识证明电路之后,所述方法还包括:获取所述零知识证明电路的验证参数;将所述验证参数和所述设备证书发送给认证服务器,以使所述认证服务器根据所述验证参数、所述设备证书和所述物联网设备发送的认证证明对所述物联网设备进行认证。
- 一种设备认证方法,其特征在于,应用于认证服务器,所述方法包括:获取物联网设备发送的认证证明;所述认证证明由所述物联网设备基于随机数据生成;根据预设的验证参数、所述物联网设备的设备证书和所述随机数据生成验证证明;根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。
- 根据权利要求8所述的方法,其特征在于,所述获取物联网设备发送的认证证明之前,所述方法还包括:获取所述物联网设备发送的第一随机数据;利用预设的加密算法对所述第一随机数据进行加密生成加密数据;将所述加密数据发送给所述物联网设备,以使所述物联网设备对所述加密数据进行解密以验证认证服务器是否合法。
- 一种设备认证系统,其特征在于,所述系统包括:至少一个物联网设备、构建服务器、认证服务器和管理服务器;所述管理服务器用于根据所述物联网设备的注册请求生成密钥以对所述物联网设备进行注册;所述构建服务器用于根据所述物联网设备的构建请求生成零知识证明电路对应的证明参数和验证参数,并将所述证明参数发送给所述物联网设备和所述认证服务器;所述物联网设备用于根据随机数据和预设的证明参数生成认证证明并发送给所述认证服务器;所述认证服务器用于根据所述验证证明和所述认证证明对所述物联网设备进行认证,获得认证结果。
- 一种物联网设备,其特征在于,包括:处理器;用于存储所述处理器可执行的计算机程序的存储器;其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如权利要求1~4任一项所述的方法。
- 一种服务器,其特征在于,包括:处理器;用于存储所述处理器可执行的计算机程序的存储器;其中,所述处理器被配置为执行所述存储器中的计算机程序,以实现如权利要求5~9任一项所述的方法。
- 一种计算机非瞬态可读存储介质,其特征在于,当所述存储介质中的可执行的计算机程序由处理器执行时,能够实现如权利要求1~9任一项所述的方法。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/280,213 US20240143727A1 (en) | 2021-11-22 | 2022-09-21 | Device authentication method and system, iot device and authentication server |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111387516.2A CN113890768A (zh) | 2021-11-22 | 2021-11-22 | 设备认证方法和系统、物联网设备和认证服务器 |
CN202111387516.2 | 2021-11-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023087895A1 true WO2023087895A1 (zh) | 2023-05-25 |
Family
ID=79016038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2022/120073 WO2023087895A1 (zh) | 2021-11-22 | 2022-09-21 | 设备认证方法和系统、物联网设备和认证服务器 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20240143727A1 (zh) |
CN (1) | CN113890768A (zh) |
WO (1) | WO2023087895A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668203A (zh) * | 2023-08-02 | 2023-08-29 | 浙江大华技术股份有限公司 | 设备认证方法、物联网设备、认证平台以及可读存储介质 |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113890768A (zh) * | 2021-11-22 | 2022-01-04 | 京东方科技集团股份有限公司 | 设备认证方法和系统、物联网设备和认证服务器 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109614820A (zh) * | 2018-12-06 | 2019-04-12 | 山东大学 | 基于零知识证明的智能合约认证数据隐私保护方法 |
US20190156019A1 (en) * | 2017-11-22 | 2019-05-23 | Aeris Communications, Inc. | Secure authentication of devices for internet of things |
CN110324151A (zh) * | 2019-06-25 | 2019-10-11 | 北京智涵芯宇科技有限公司 | 基于puf和零知识证明的安全芯片及应用方法、系统及介质 |
CN111211908A (zh) * | 2019-12-25 | 2020-05-29 | 深圳供电局有限公司 | 访问控制方法、系统、计算机设备和存储介质 |
CN112260995A (zh) * | 2018-03-31 | 2021-01-22 | 华为技术有限公司 | 接入认证方法、装置及服务器 |
CN112436940A (zh) * | 2021-01-27 | 2021-03-02 | 电子科技大学 | 一种基于零知识证明的物联网设备可信启动管理方法 |
CN112565265A (zh) * | 2020-12-04 | 2021-03-26 | 国网辽宁省电力有限公司沈阳供电公司 | 物联网终端设备间的认证方法、认证系统及通讯方法 |
CN113890768A (zh) * | 2021-11-22 | 2022-01-04 | 京东方科技集团股份有限公司 | 设备认证方法和系统、物联网设备和认证服务器 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4996904B2 (ja) * | 2006-10-04 | 2012-08-08 | 株式会社日立製作所 | 生体認証システム、登録端末、認証端末、及び認証サーバ |
KR101428865B1 (ko) * | 2012-10-25 | 2014-08-12 | 순천향대학교 산학협력단 | Nfc 모바일 결제정보보호를 위한 ntru 암호체계 기반 영지식 증명 시스템 및 방법 |
US9860221B2 (en) * | 2015-03-10 | 2018-01-02 | Intel Corporation | Internet of things group formation using a key-based join protocol |
-
2021
- 2021-11-22 CN CN202111387516.2A patent/CN113890768A/zh active Pending
-
2022
- 2022-09-21 US US18/280,213 patent/US20240143727A1/en active Pending
- 2022-09-21 WO PCT/CN2022/120073 patent/WO2023087895A1/zh unknown
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190156019A1 (en) * | 2017-11-22 | 2019-05-23 | Aeris Communications, Inc. | Secure authentication of devices for internet of things |
CN112260995A (zh) * | 2018-03-31 | 2021-01-22 | 华为技术有限公司 | 接入认证方法、装置及服务器 |
CN109614820A (zh) * | 2018-12-06 | 2019-04-12 | 山东大学 | 基于零知识证明的智能合约认证数据隐私保护方法 |
CN110324151A (zh) * | 2019-06-25 | 2019-10-11 | 北京智涵芯宇科技有限公司 | 基于puf和零知识证明的安全芯片及应用方法、系统及介质 |
CN111211908A (zh) * | 2019-12-25 | 2020-05-29 | 深圳供电局有限公司 | 访问控制方法、系统、计算机设备和存储介质 |
CN112565265A (zh) * | 2020-12-04 | 2021-03-26 | 国网辽宁省电力有限公司沈阳供电公司 | 物联网终端设备间的认证方法、认证系统及通讯方法 |
CN112436940A (zh) * | 2021-01-27 | 2021-03-02 | 电子科技大学 | 一种基于零知识证明的物联网设备可信启动管理方法 |
CN113890768A (zh) * | 2021-11-22 | 2022-01-04 | 京东方科技集团股份有限公司 | 设备认证方法和系统、物联网设备和认证服务器 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116668203A (zh) * | 2023-08-02 | 2023-08-29 | 浙江大华技术股份有限公司 | 设备认证方法、物联网设备、认证平台以及可读存储介质 |
CN116668203B (zh) * | 2023-08-02 | 2023-10-20 | 浙江大华技术股份有限公司 | 设备认证方法、物联网设备、认证平台以及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN113890768A (zh) | 2022-01-04 |
US20240143727A1 (en) | 2024-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10382485B2 (en) | Blockchain-assisted public key infrastructure for internet of things applications | |
CN110750803B (zh) | 数据提供和融合的方法及装置 | |
JP6547079B1 (ja) | 登録・認可方法、装置及びシステム | |
US9912485B2 (en) | Method and apparatus for embedding secret information in digital certificates | |
US20190238311A1 (en) | Blockchain system and data processing method for blockchain system | |
WO2023087895A1 (zh) | 设备认证方法和系统、物联网设备和认证服务器 | |
JP4113274B2 (ja) | 認証装置および方法 | |
JP4638912B2 (ja) | ディストリビューションcdを使用した、署名されたグループにおけるダイレクトプルーフの秘密鍵を装置に伝達する方法 | |
US11601268B2 (en) | Device attestation including attestation-key modification following boot event | |
US20060195689A1 (en) | Authenticated and confidential communication between software components executing in un-trusted environments | |
US20180375667A1 (en) | Apparatus and method for certificate enrollment | |
KR102591826B1 (ko) | Puf를 이용한 인증서 기반 디바이스 인증 장치 및 방법 | |
CN111106929A (zh) | 一种基于hash的审批方法 | |
CN114244501A (zh) | 电力数据隐私保护系统及其实现方法、加密属性撤销方法 | |
CN116015906B (zh) | 用于隐私计算的节点授权方法、节点通信方法和装置 | |
WO2022227799A1 (zh) | 设备注册方法及装置、计算机设备、存储介质 | |
JP2004032706A (ja) | 認証通信システム、認証通信装置及び認証通信方法 | |
CN113159774A (zh) | 一种区块链中可监管零知识证明验证方法及系统 | |
KR20170111809A (ko) | 대칭키 기반의 보안 토큰을 이용한 양방향 인증 방법 | |
KR101893758B1 (ko) | 암호화된 트래픽 분석을 통한 내부 정보 유출 모니터링 시스템 및 방법 | |
CN111865568A (zh) | 面向数据传输的存证方法、传输方法及系统 | |
CN114710266B (zh) | 认证方法、量子密钥分发方法、装置及量子密码网络 | |
US20240348592A1 (en) | Apparatus and method for managing credentials | |
Chaki et al. | Verification across intellectual property boundaries | |
CN114765531B (zh) | 认证方法、量子密钥调用方法、装置及量子密码网络 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22894433 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |