WO2023216813A1 - 安全认证方法、装置、系统、电子设备及存储介质 - Google Patents

安全认证方法、装置、系统、电子设备及存储介质 Download PDF

Info

Publication number
WO2023216813A1
WO2023216813A1 PCT/CN2023/088627 CN2023088627W WO2023216813A1 WO 2023216813 A1 WO2023216813 A1 WO 2023216813A1 CN 2023088627 W CN2023088627 W CN 2023088627W WO 2023216813 A1 WO2023216813 A1 WO 2023216813A1
Authority
WO
WIPO (PCT)
Prior art keywords
host
external device
authentication
authentication request
target
Prior art date
Application number
PCT/CN2023/088627
Other languages
English (en)
French (fr)
Inventor
程浩伟
Original Assignee
深圳市广和通无线通信软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市广和通无线通信软件有限公司 filed Critical 深圳市广和通无线通信软件有限公司
Publication of WO2023216813A1 publication Critical patent/WO2023216813A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present disclosure generally relates to the field of communication technology, and more specifically to security authentication methods, devices, systems, electronic equipment and storage media.
  • USB-ACM address complete message
  • USB-ACM interface receives any AT command (attention command) sent by the host through the USB-ACM interface.
  • AT command attention command
  • the arbitrary AT commands include advanced AT commands, that is, AT commands that contain sensitive data related to external devices and important factory production information.
  • the external device operates according to the received AT command, which may cause sensitive data and important factory production information related to the external device in the AT command to be leaked or tampered with, making the external device less secure.
  • the present disclosure provides a security authentication method, which is applied to an external device.
  • the method includes:
  • the target port is configured for the external device to communicate with the host;
  • the authentication request includes a unique authentication password for the host
  • Determining whether to access the target command based on the authentication request includes:
  • the Methods after the step of denying access to the target command configured by the host to be issued to the external device if the authentication request issued by the host is not received through the target port, the Methods also include: and
  • the method further includes:
  • the third prompt information is used to prompt for denial of access to a target command configured by the host to be issued to the external device.
  • the present disclosure provides a security authentication method, which is applied to the host.
  • the method includes:
  • the target command; the target port is configured for the external device to communicate with the host.
  • the method further includes:
  • the first prompt information is used to prompt the host to re-issue the authentication request; in response to the first prompt information, re-issue the authentication request to the external device. Issue authentication request;
  • the second prompt information reported by the external device is received through the target port, and the second prompt information is used to prompt the host to fail in authentication.
  • the method before sending the authentication request to the external device through the target port of the host, the method further includes:
  • the unique authentication password is a hash value obtained by hashing the first identifier of the host, the second identifier of the host, and the preset password of the host;
  • the authentication request is generated based on the host's unique authentication password.
  • a security authentication device which includes:
  • An access module configured to access a host and obtain a target port of the host; the target port is configured to allow the external device to communicate with the host;
  • An access module configured to deny access to a target command configured to be issued by the host to the external device if the authentication request issued by the host is not received through the target port; if an authentication request is received through the target port Based on the authentication request issued by the host, it is determined whether to access the target command based on the authentication request.
  • a security authentication device which includes:
  • a connection module configured to connect external devices
  • a delivery module configured to deliver an authentication request to the external device through a target port of the host, so that the external device determines whether to access the host configured to download based on whether it receives the authentication request through the target port.
  • the present disclosure provides a security authentication system.
  • the system includes an external device and a host; wherein, after the external device is connected to the host, the external device and the host conduct authentication through a target port on the host. communication;
  • the external device is configured to access the host and obtain the target port of the host;
  • the host is configured to connect to the external device; issue an authentication request to the external device through a target port of the host, so that the external device determines whether to access the device based on whether it receives the authentication request through the target port.
  • the host is configured to deliver a target command to the external device;
  • the external device is also configured to deny access to the target command configured by the host to be issued to the external device if the authentication request issued by the host is not received through the target port; When the port receives the authentication request issued by the host, it determines whether to access the target command based on the authentication request.
  • the target port is a universal serial bus port
  • the external device is a device that accesses the host through the universal serial bus port.
  • the present disclosure provides an electronic device, which includes a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory complete communication with each other through the communication bus;
  • Memory configured to store a computer program
  • the processor is configured to implement the security authentication method described in the present disclosure when executing a program stored on the memory.
  • the present disclosure provides a computer-readable storage medium on which a computer program is stored.
  • the security authentication method of the present disclosure is implemented.
  • the external device accesses the host and obtains the target port of the host, it determines whether to deny access to the host configuration and issue it to the external device based on whether the authentication request issued by the host is received through the target port.
  • the target command of the device avoids information leakage in the target command caused by direct access to the host without receiving an authentication request or authenticating the host, ensuring the security of external devices and information security.
  • Figure 1 is a schematic flowchart 1 of a security authentication method provided by an embodiment of the present disclosure
  • Figure 2 is a schematic flowchart 2 of a security authentication method provided by an embodiment of the present disclosure
  • Figure 3 is a schematic diagram of a process of generating a unique authentication password provided by an embodiment of the present disclosure
  • Figure 4 is a schematic flowchart 3 of a security authentication method provided by an embodiment of the present disclosure.
  • Figure 5 is a schematic diagram of the security authentication process provided by an embodiment of the present disclosure.
  • Figure 6 is a schematic diagram of a security authentication system provided by an embodiment of the present disclosure.
  • Figure 7 is a schematic diagram 1 of a security authentication device provided by an embodiment of the present disclosure.
  • Figure 8 is a schematic diagram 2 of a security authentication device provided by an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
  • the security authentication method is applied to external devices, as shown in Figure 1.
  • the security authentication method includes steps 101 to 103:
  • Step 101 Access the host and obtain the target port of the host, where the target port is configured for the external device to communicate with the host;
  • Step 102 If the authentication request issued by the host is not received through the target port, deny access to the target command configured by the host to be issued to the external device;
  • Step 103 If the authentication request issued by the host is received through the target port, determine whether to access the target command based on the authentication request.
  • the target port is a USB port.
  • the target port is a USB-ACM port.
  • step 101 execution of step 102 or step 103 is determined based on whether the authentication request issued by the host is received through the target port.
  • the authentication request is used to request the external device to authenticate the host to determine whether the host has the authority to issue the target command.
  • the first prompt information is generated, and the first prompt information is Report to the host.
  • the first prompt information is used to prompt the host to re-issue the authentication request. In this way, when the external device does not receive the authentication request, it prompts the host to resend the authentication request, so that the external device authenticates the host and accesses the target command after authentication, ensuring the smooth execution of the target command and ensuring that the external device Equipment security.
  • the fourth prompt information is generated, and the fourth prompt information is generated according to the fourth prompt information. Prompt.
  • the fourth prompt information Used to prompt that the external device does not have permission to access the target command configured by the host to be delivered to the external device.
  • the external device can directly generate the fourth prompt information and prompt that the external device does not have the right to access the target command to prevent the sensitive information or factory production information of the external device from being tampered with or illegally erased. Writing causes the production information of external devices to be untraceable, thus ensuring the security of external devices.
  • the fourth prompt information is an operation error prompt.
  • the external device may only generate the first prompt information or the fourth prompt information. It is also possible to generate both the first prompt information and the fourth prompt information.
  • the authentication request includes the host's unique authentication password.
  • the host in response to the received authentication request, the host is authenticated based on the unique authentication password of the host in the authentication request, and the authentication result is obtained. If the authentication result is authentication passed, the target command is accessed; if the authentication result is authentication failed, access to the target command is denied.
  • passing the authentication means that the host has the authority to modify sensitive data of external devices or factory production information.
  • failure to pass the authentication means that the host does not have the authority to modify sensitive data of external devices or factory production information.
  • the second prompt information is generated, and the second prompt information is reported to the host.
  • the second prompt information is used to prompt that the host authentication fails. In this way, when the authentication result of the host is failed, the second prompt information for prompting the host authentication failure is reported to the host, so that the host can respond to the second prompt information and re-authenticate to execute the target command or give up executing the target. Order.
  • a third prompt message is generated, and a prompt is issued according to the third prompt message.
  • the third prompt information is used to prompt for denial of access to a target command configured by the host to be delivered to the external device.
  • the external device denies access to the target command when the authentication result is that the authentication fails. Subsequently, the external device generates third prompt information, and prompts the user using the external device through the external device according to the third prompt information.
  • the external device may only generate the second prompt information or the third prompt information, or may generate both the second prompt information and the third prompt information.
  • the external device determines whether to deny access to the target command configured by the host to be issued to the external device based on whether it receives the authentication request sent by the host, so as to avoid the situation where the authentication request is not received or the host is not authenticated.
  • directly access the host guide Causes information leakage in target commands to ensure the security of external devices.
  • the quick reaction communications terminal that is, the port used by the external device may be a specially customized USB port, which needs to rely on a specific USB driver.
  • the external device can only be used on the Windows host, but during the production test of the external device, the external device may be unable to connect to the Windows host, and the test of the external device cannot be completed.
  • the USB-ACM port by using the USB-ACM port, the above problems can be better avoided, and compared with the above-mentioned specially customized USB port, the USB-ACM port is more stable, without adjusting the original USB interface, and also achieves better USB port compatibility, reducing the impact on USB enumeration and driver loading.
  • the security authentication method should be configured in the host, as shown in Figure 2.
  • the security authentication method includes steps 201-202:
  • Step 201 Connect external devices
  • Step 202 Send the authentication request to the external device through the target port of the host.
  • the authentication request is sent to the external device through the target port of the host, so that the external device determines whether to access the target command configured by the host to be issued to the external device based on whether it receives the authentication request through the target port.
  • the target port is configured for the external device to communicate with the host.
  • the first prompt information reported by the external device is received through the target port, and in response to the first prompt information, the authentication request is re-sent to the external device. request; or, receive the second prompt information reported by the external device through the target port.
  • the first prompt information and the second prompt information please refer to the above content and will not be described again here.
  • the external device After the authentication request is sent to the external device through the target port of the host, if the external device does not successfully receive the authentication request sent by the host through the target port, regardless of whether it receives the target command sent by the host, the external device sends a request to the host. Report the first prompt information.
  • the host when the host only sends the target request through the target port, it directly receives the first prompt information. Only when the host sends the authentication request to the external device and the external device successfully receives the authentication request, the external device can access the host. It is configured to deliver a target command to an external device, and then obtains the target command and adjusts its sensitive data or factory production information according to the target command.
  • the host in response to the second prompt information, can regenerate an authentication request based on its unique authentication password and send it to the external device to request the external device to re-authenticate the host to avoid incorrect authentication results.
  • the unique authentication password of the host is obtained before sending the authentication request to the external device through the target port of the host.
  • the unique authentication password of the host is a hash value obtained by hashing the first identifier of the host, the second identifier of the host and the preset password of the host.
  • the first identity of the host and the second identity of the host are identities configured to represent the identity of the host.
  • the first identification of the host may be the international mobile equipment of the host.
  • International mobile equipment identity IMEI
  • the second identification of the host may be a serial number (SN) of the host.
  • the preset password of the host is determined based on the device model of the host. That is to say, there is a corresponding relationship between the preset password and the device model of the host. If the device models of different hosts are different, the default passwords may be different.
  • the device model of host 1 and host 2 are the same as model A, the device model of host 3 is different from the device model of host 1, and the device model of host 3 is model B.
  • the default passwords of host 1 and host 3 are the same, password 1 corresponding to model A, and the default password of host 2 is password 2 corresponding to model B.
  • the host's unique authentication password is obtained from its local storage or directly from the server, or may be generated by the host itself.
  • the unique authentication password stored locally on the host may be written to the host during its production phase.
  • the server obtains the first identification of the host, the second identification of the host, and the preset password of the host, and uses a hash algorithm through the server to compare the obtained first identification, the second identification of the host, and the preset password of the host.
  • the second identifier of the host is calculated with the preset password of the host to obtain a hash value, and the hash value is sent to the host as the host's unique authentication password.
  • the host stores the unique authentication password and writes the unique authentication password in the host.
  • the unique authentication password of the above host is written into the host through AT command.
  • the host's unique authentication password is obtained from the server.
  • the process of the server generating the host's unique authentication password please refer to the above content and will not be described again here.
  • the host when the host needs to use a unique authentication password, the host obtains its first identification, second identification and default password, and uses a hash algorithm to compare the obtained first identification, second identification and The preset password is calculated to obtain a hash value, and the hash value is used as the host's unique authentication password.
  • the hashing algorithm may be the MD5 algorithm.
  • the process of generating a unique authentication password is shown in Figure 3.
  • the IMEI of the host, the SN of the host, and the default password of the host are obtained, and the IMEI, SN, and default password are processed through a hash algorithm. Calculate and obtain the hash values of these three, and use the hash value as the unique authentication password of the host.
  • the process of writing a unique authentication password for the host is as follows: during the host production stage, write the IMEI such as 868866050005276, the SN such as FF22MJ0051, and the plaintext password (i.e., the above-mentioned default password) such as fibotestpassword, and use a hash algorithm to Calculate the IMEI, SN and plain text password to obtain the corresponding hash value, which is the unique authentication password of the host, such as FC751BE70E9D505F291D4B13E84F9887.
  • the unique authentication password of the host such as FC751BE70E9D505F291D4B13E84F9887.
  • USB device taking a USB device as an example, after the USB device is inserted into the host, the host is connected to the USB device. Before the host communicates with the USB device, that is, before the host issues a target command to the USB device, the USB device needs to perform a command on the host. Authentication. After successful authentication, the USB device communicates normally with the host. Subsequently, if the USB device is pulled out of the host and the two are disconnected, the previous authentication result will be invalid. Afterwards, if the USB device is re-inserted into the host, it will need to be authenticated again.
  • the security authentication method includes steps 401 to 405:
  • Step 401 Connect the external device to the host
  • Step 402 The external device obtains the target port of the host
  • Step 403 The host sends the authentication request to the external device
  • Step 404 If the external device does not receive the authentication request issued by the host, deny access to the target command configured by the host to be issued to the external device;
  • Step 405 If the external device receives the authentication request issued by the host, it determines whether to access the target command based on the authentication request.
  • the external device receives the authentication request from the host through the target port, and executes step 404 or step 405 depending on whether the authentication request is received.
  • the USB device enumerates the USB-ACM port of the host. Subsequently, the host sends a unique authentication password through the USB-ACM port, allowing the USB device to Host access rights are authenticated. If it passes the authentication, that is, the authentication is successful, the USB device is allowed to access sensitive data or factory production information through the USB-ACM port, that is, the above host is configured to issue the target command to the USB device; if it does not pass the authentication, that is, the authentication fails, the USB is rejected The device accesses sensitive data or factory production information through the USB-ACM port.
  • the target command is any command issued by the host to the external device, or may be a high-level command issued by the host to the external device.
  • advanced commands are used to modify sensitive data (such as IMEI) or factory production information of external devices.
  • the factory production information of the external device may be the product batch number, material source, factory number, work station number, product factory information, and and factory verification results, etc.
  • the external device before receiving all target commands issued by the host, the external device
  • the security authentication system is configured to implement the above security authentication method.
  • the security authentication system 600 includes an external device 601 and a host 602.
  • the external device 601 After the external device 601 is connected to the host 602, the external device 601 and the host 602 communicate through the target port on the host.
  • the external device 601 is configured to access the host and obtain the target port of the host.
  • the host 602 is configured to connect to an external device, and sends an authentication request to the external device through the target port of the host, so that the external device determines whether to access the target command configured by the host to be sent to the external device based on whether it receives the authentication request through the target port.
  • the external device 601 is also configured to deny access to the target command configured by the host to be issued to the external device if the authentication request issued by the host is not received through the target port; if the authentication request issued by the host is received through the target port, then Determine whether to access the target command based on the authentication request.
  • the target port is a USB port
  • the external device is a device connected to the host through the USB port.
  • the USB port may be a USB-ACM port.
  • the present disclosure provides a security authentication device 700, which includes an access module 701 and an access module 702.
  • the access module 701 is configured to access the host and obtain the target port of the host; the target port is configured to allow an external device to communicate with the host.
  • the access module 702 is configured to deny access to the target command configured by the host to be issued to the external device if the authentication request issued by the host is not received through the target port; if an authentication request issued by the host is received through the target port, based on Authentication requests determine whether to access the target command.
  • the present disclosure provides a security authentication device 800, which includes a connection module 801 and a delivery module 802.
  • connection module 801 is configured to connect external devices.
  • the delivery module 802 is configured to deliver the authentication request to the external device through the target port of the host, so that the external device determines whether to access the target command configured by the host to be delivered to the external device based on whether it receives the authentication request through the target port; target Ports are configured for external devices to communicate with the host.
  • the present disclosure provides an electronic device 900, which includes a processor 901, a communication interface 902, a memory 903, and a communication bus 904.
  • the processor 901, the communication interface 902, and the memory 903 complete interactions with each other through the communication bus 904. Communication,
  • Memory 903 configured to store computer programs
  • the processor 901 is configured to implement the security authentication method provided by the present disclosure when executing the program stored on the memory 903.
  • the electronic device 900 provided by the embodiment of the present disclosure may be a module capable of realizing communication functions or a terminal device including the module.
  • the terminal device may be a mobile terminal or an intelligent terminal. end.
  • the mobile terminal can be at least one of a mobile phone, a tablet computer, a notebook computer, etc.;
  • the smart terminal can be a terminal containing a wireless communication module such as a smart car, a smart watch, a shared bicycle, a smart cabinet, etc.;
  • the module can be a wireless communication module.
  • Communication module such as any of 2G communication module, 3G communication module, 4G communication module, 5G communication module, NB-IOT communication module, etc.
  • Embodiments of the present disclosure also provide a computer-readable storage medium on which a computer program is stored.
  • the computer program is executed by a processor, the steps of the security authentication method provided by any of the foregoing method embodiments are implemented.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

一种安全认证方法、装置、系统、电子设备及存储介质,该安全认证方法应用于外接设备中,该方法包括:接入主机并获取主机的目标端口,目标端口配置为外接设备与主机设备进行通信;若通过目标端口未接收到主机下发的认证请求,则拒绝访问主机配置为下发给外接设备的目标命令;若通过目标端口接收到主机下发的认证请求,则基于认证请求确定是否访问该目标命令。

Description

安全认证方法、装置、系统、电子设备及存储介质
相关申请的引用
本公开要求于2022年5月9日向中华人民共和国国家知识产权局提交的申请号为202210502208.8、发明名称为“安全认证方法、装置、系统、电子设备及存储介质”的发明专利的优先权,并通过引用的方式将其全部内容并入本公开。
领域
本公开大体上涉及通信技术领域,更具体地涉及安全认证方法、装置、系统、电子设备及存储介质。
背景
一般地,外接设备通过通用串行总线(universal serial bus,USB)中地址全信息(address complete message,ACM)即USB-ACM的接口,接入主机后,枚举该外接设备与主机之间的USB-ACM接口,并通过该USB-ACM接口接收主机发送的任意AT命令(attention command)。其中,该任意AT命令中包括高级AT命令,即包含有与外接设备相关的敏感数据和重要工厂生产信息的AT命令。此时,外接设备按照接收到的AT命令进行操作,可能会造成该AT命令中与外接设备相关的敏感数据和重要工厂生产信息泄露或被篡改,使得该外接设备的安全性较低。
概述
第一方面,本公开提供了安全认证方法,其应用于外接设备中,该方法包括:
接入主机并获取所述主机的目标端口;所述目标端口配置为所述外接设备与所述主机进行通信;
若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;以及
若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
在某些实施方案中,所述认证请求包括所述主机的唯一认证密码;
所述基于所述认证请求确定是否访问所述目标命令,包括:
响应于接收到的认证请求,基于所述认证请求中所述主机的唯一认证密码对所述主机进行认证,得到认证结果;
若所述认证结果为认证通过,则访问所述目标命令;以及
若所述认证结果为认证未通过,则拒绝访问所述目标命令。
在某些实施方案中,在所述若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令之后,所述方法还包括:以及
生成第一提示信息并将所述第一提示信息上报给所述主机,所述第一提示信息用于提示所述主机重新下发认证请求。
在某些实施方案中,在所述若所述认证结果为认证未通过,则拒绝访问所述目标命令之后,所述方法还包括:
生成第二提示信息,并将所述第二提示信息上报给所述主机,所述第二提示信息用于提示所述主机认证失败;
和/或,生成第三提示信息,并按照所述第三提示信息进行提示;所述第三提示信息用于提示拒绝访问所述主机配置为下发给所述外接设备的目标命令。
第二方面,本公开提供安全认证方法,其应用于主机中,该方法包括:
连接外接设备;
通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所述外接设备的目标命令;所述目标端口配置为所述外接设备与所述主机进行通信。
在某些实施方案中,在所述通过主机的目标端口下发认证请求给所述外接设备之后,所述方法还包括:
通过所述目标端口接收所述外接设备上报的第一提示信息,所述第一提示信息用于提示所述主机重新下发认证请求;响应于所述第一提示信息,重新向所述外接设备下发认证请求;
或者,
通过所述目标端口接收所述外接设备上报的第二提示信息,所述第二提示信息用于提示所述主机认证失败。
在某些实施方案中,在所述通过主机的目标端口下发认证请求给所述外接设备之前,所述方法还包括:
获取所述主机的唯一认证密码;所述唯一认证密码为对所述主机的第一标识、所述主机的第二标识以及所述主机的预设密码进行哈希运算得到的哈希值;
基于所述主机的唯一认证密码生成所述认证请求。
第三方面,本公开提供了安全认证装置,该装置包括:
接入模块,配置为接入主机并获取所述主机的目标端口;所述目标端口配置为所述外接设备与所述主机进行通信;
访问模块,配置为若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
第四方面,本公开提供了安全认证装置,该装置包括:
连接模块,配置为连接外接设备;
下发模块,配置为通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所述外接设备的目标命令;所述目标端口配置为所述外接设备与所述主机进行通信。
第五方面,本公开提供了安全认证系统,该系统包括外接设备与主机;其中,所述外接设备接入所述主机后,所述外接设备与所述主机通过所述主机上的目标端口进行通信;
所述外接设备,配置为接入所述主机并获取所述主机的目标端口;
所述主机,配置为连接所述外接设备;通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所述外接设备的目标命令;
所述外接设备,还配置为若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
在某些实施方案中,所述目标端口为通用串行总线端口,所述外接设备为通过所述通用串行总线端口接入所述主机的设备。
第六方面,本公开提供了电子设备,其包括处理器、通信接口、存储器和通信总线,其中,所述处理器,所述通信接口,所述存储器通过所述通信总线完成相互间的通信;
存储器,配置为存放计算机程序;
处理器,配置为执行存储器上所存放的程序时,实现本公开所述的安全认证方法。
第七方面,本公开提供了计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现本公开所述的安全认证方法。
本公开实施例提供的该安全认证方法,在外接设备接入主机并获取主机的目标端口后,根据是否通过目标端口接收到主机下发的认证请求,确定是否拒绝访问主机配置为下发给外接设备的目标命令,避免在未接收到认证请求或者说未对主机进行认证的情况下,直接访问主机导致目标命令中的信息泄露,保证外接设备的安全性以及信息安全性。
附图简要说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,对于本领域普通技术人员而言,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本公开一实施例提供的安全认证方法的流程示意图一;
图2为本公开一实施例提供的安全认证方法的流程示意图二;
图3为本公开一实施例提供的生成唯一认证密码的过程的示意图;
图4为本公开一实施例提供的安全认证方法的流程示意图三;
图5为本公开一实施例提供的安全认证流程的示意图;
图6为本公开一实施例提供的安全认证系统的示意图;
图7为本公开一实施例提供的安全认证装置的示意图一;
图8为本公开一实施例提供的安全认证装置的示意图二;以及
图9为本公开一实施例提供的电子设备的结构示意图。
详述
为使本公开实施例的目的、技术方案和优点更加清楚,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本公开的一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动的前提下所获得的所有其他实施例,都属于本公开保护的范围。
为了解决外接设备按照接收到的AT命令进行操作,可能会造成该AT命令中与外接设备相关的数据和信息泄露或被篡改,使得外接设备的安全性较低的问题,本公开实施例提供了安全认证方法,应用于外接设备中,如图1所示,该安全认证方法包括步骤101-步骤103:
步骤101:接入主机并获取主机的目标端口,其中,目标端口配置为外接设备与主机进行通信;
步骤102:若通过目标端口未接收到主机下发的认证请求,则拒绝访问主机配置为下发给外接设备的目标命令;以及
步骤103:若通过目标端口接收到主机下发的认证请求,则基于认证请求确定是否访问目标命令。
在某些实施方案中,目标端口为USB端口。
在某些实施方案中,目标端口为USB-ACM端口。
需要说明的是,在执行步骤101后,根据是否通过目标端口接收到主机下发的认证请求,来确定执行步骤102或步骤103。
其中,认证请求用于请求外接设备对主机进行认证,以确定主机是否具有下发目标命令的权限。
在某些实施方案中,在通过目标端口未接收到主机下发的认证请求,并拒绝访问主机配置为下发给外接设备的目标命令之后,生成第一提示信息,并将该第一提示信息上报给主机。其中,第一提示信息用于提示主机重新下发认证请求。这样,外接设备在没有接收到认证请求的情况下,提示主机重新发送认证请求,以使得外接设备对主机进行认证,在经过认证的情况下访问目标命令,保证目标命令的顺利执行,并保证外接设备的安全。
在某些实施方案中,在通过目标端口未接收到主机下发的认证请求,并拒绝访问主机配置为下发给外接设备的目标命令之后,生成第四提示信息,并按照该第四提示信息进行提示。其中,第四提示信息 用于提示外接设备无权访问主机配置为下发给外接设备的目标命令。
这样的话,若某一用户在不知道其使用的外接设备连接的主机的唯一认证密码时,了解到目标命令的使用方法,并通过访问该目标命令尝试修改该外接设备的IMEI等敏感信息时,由于该外接设备未通过目标端口接收到认证请求,外接设备可直接生成第四提示信息并进行提示,提示外接设备无权访问目标命令,避免外接设备的敏感信息或工厂生产信息被篡改或非法擦写导致外接设备的生产信息无法追溯,从而保证外接设备的安全。
在某些实施方案中,第四提示信息为操作错误提示。
需要说明的是,在通过目标端口未接收到主机下发的认证请求,并拒绝访问主机配置为下发给外接设备的目标命令之后,外接设备可仅生成第一提示信息或第四提示信息,也可既生成第一提示信息又生成第四提示信息。
在某些实施方案中,认证请求包括主机的唯一认证密码。此时,基于认证请求确定是否访问目标命令的过程中,响应于接收到的认证请求,基于认证请求中主机的唯一认证密码对主机进行认证,得到认证结果。若认证结果为认证通过,则访问目标命令;若认证结果为认证未通过,则拒绝访问目标命令。
其中,认证通过即表示主机具备对外接设备的敏感数据或工厂生产信息等进行修改的权限。相应的,认证未通过则表示该主机不具备对外接设备的敏感数据或工厂生产信息等进行修改的权限。
这样,在接收到认证请求的情况下,进一步根据认证结果来确定是否访问目标命令,避免目标命令中的信息泄露,保证外接设备的安全。
在某些实施方案中,在认证结果为认证未通过,并拒绝访问目标命令后,生成第二提示信息,并将第二提示信息上报给主机。其中,第二提示信息用于提示主机认证失败。这样,在主机的认证结果为未通过时,将用于提示主机认证失败的第二提示信息上报给主机,以便于主机响应于该第二提示信息,重新进行认证以执行目标命令或放弃执行目标命令。
在某些实施方案中,在认证结果为认证未通过,并拒绝访问目标命令后,生成第三提示信息,并按照第三提示信息进行提示。其中,第三提示信息用于提示拒绝访问主机配置为下发给外接设备的目标命令。
在某些实施方案中,外接设备在得到认证结果为认证未通过时,拒绝访问目标命令。随后,外接设备生成第三提示信息,并按照第三提示信息通过该外接设备对使用该外接设备的用户进行提示。
需要说明的是,在认证结果为认证未通过,并拒绝访问目标命令后,外接设备可仅生成第二提示信息或第三提示信息,也可既生成第二提示信息又生成第三提示信息。
通过上述过程,外接设备根据是否接收到主机下发的认证请求,确定是否拒绝访问主机配置为下发给外接设备的目标命令,避免在未接收到认证请求或者说未对主机进行认证的情况下,直接访问主机导 致目标命令中的信息泄露,保证外接设备的安全性。
另外,快速反应通信终端(quick reaction communications terminal,QRCT),即外接设备所使用的端口可能是特殊定制的USB端口,需要依赖于特定的USB驱动,在实际生产过程中可能会存在兼容性问题,例如该外接设备仅能在windows主机上使用,但在对外接设备的生产测试过程中该外接设备可能会出现无法连接windows主机的情况,不能完成对该外接设备的测试。本公开中,通过使用USB-ACM端口,可较好的避免上述问题,且相对于上述特殊定制的USB端口,USB-ACM端口更加稳定,未对原有USB接口进行调整,也实现了较好的USB端口的兼容,减少对USB枚举和驱动加载的影响。
为了解决外接设备按照接收到的AT命令进行操作,可能会造成该AT命令中与外接设备相关的数据和信息泄露或被篡改,使得外接设备的安全性较低的问题,本公开实施例提供了安全认证方法,其应配置为主机中,如图2所示,该安全认证方法包括步骤201-步骤202:
步骤201:连接外接设备;以及
步骤202:通过主机的目标端口下发认证请求给外接设备。
在某些实施方案中,通过主机的目标端口下发认证请求给外接设备,以便于外接设备根据是否通过目标端口接收到认证请求,确定是否访问主机配置为下发给外接设备的目标命令。其中,目标端口配置为外接设备与主机进行通信。
在某些实施方案中,在通过主机的目标端口下发认证请求给外接设备之后,通过目标端口接收外接设备上报的第一提示信息,并响应于该第一提示信息,重新向外接设备发送认证请求;或者,通过目标端口接收外接设备上报的第二提示信息。其中,关于第一提示信息与第二提示信息的介绍可参见上述内容,在此不进行赘述。
其中,在通过主机的目标端口下发认证请求给外接设备后,若外接设备未通过目标端口成功接收到主机下发的认证请求,不论是否有接收到主机下发的目标命令,外接设备向主机上报第一提示信息。
也就是说,主机通过目标端口仅下发目标请求时,直接接收到第一提示信息,只有在当主机下发认证请求给外接设备且外接设备成功接收到该认证请求时,外接设备才能访问主机配置为下发给外接设备的目标命令,进而获取该目标命令并根据该目标命令调整其敏感数据或工厂生产信息等。
在某些实施方案中,响应于第二提示信息,主机可基于其唯一认证密码重新生成认证请求并下发给外接设备,以请求外接设备重新对主机进行认证,避免认证结果出现错误的情况。
在某些实施方案中,在通过主机的目标端口下发认证请求给外接设备之前,获取主机的唯一认证密码。其中,主机的唯一认证密码是对该主机的第一标识、该主机的第二标识和该主机的预设密码进行哈希运算得到的哈希值。
在某些实施方案中,主机的第一标识与主机的第二标识为配置为表示该主机的身份的标识。
在某些实施方案中,主机的第一标识可以为该主机的国际移动设 备识别码(international mobile equipment identity,IMEI)。
在某些实施方案中,主机的第二标识可以为该主机的序列号(serial number,SN)。
在某些实施方案中,上述主机的预设密码是基于该主机的设备型号确定的。也就是说,预设密码与主机的设备型号之间具有对应关系。不同主机的设备型号不同,则预设密码可能不同。
在某些实施方案中,对于主机1-主机3来说,主机1与主机2的设备型号相同为型号A,主机3的设备型号与主机1的设备型号不同,主机3的设备型号为型号B。此时,主机1与主机3的预设密码相同,均为与型号A对应的密码1,主机2的预设密码为型号B对应的密码2。
在某些实施方案中,主机的唯一认证密码是从其本地存储或从服务器直接获取到的,也可以是由主机本身生成的。
在某些实施方案中,主机本地存储的唯一认证密码可以是在主机的生产阶段写入到主机中的。在这一过程中,主机的工厂生产阶段通过例如服务器获取主机的第一标识、主机的第二标识和主机的预设密码,并通过服务器采用哈希算法对获取到的主机的第一标识、主机的第二标识和主机的预设密码进行运算,得到哈希值,并将该哈希值作为主机的唯一认证密码下发给主机。相应的,主机存储该唯一认证密码,实现该唯一认证密码在主机中的写入。其中,上述主机唯一认证密码通过AT命令写入到主机中。
或者,在某些实施方案中,在主机需要使用唯一认证密码时,从服务器获取该主机的唯一认证密码。关于服务器生成主机的唯一认证密码的过程可以参见上述内容,在此不再进行赘述。
或者,在某些实施方案中,在主机需要使用唯一认证密码时,主机获取其第一标识、第二标识和预设密码,并采用哈希算法对获取到的第一标识、第二标识和预设密码进行运算,得到哈希值,并将该哈希值作为主机的唯一认证密码。
在某些实施方案中,哈希算法可以为MD5算法。
在某些实施方案中,生成唯一认证密码的过程如图3所示,获取该主机的IMEI、该主机的SN以及主机的预设密码,经哈希算法对该IMEI、SN和预设密码进行运算,得到这三者的哈希值,并将该哈希值作为主机的唯一认证密码。
在某些实施方案中,为主机写入唯一认证密码的过程如下:在主机生产阶段写入IMEI例如868866050005276、SN例如FF22MJ0051以及明文密码(即上述预设密码)例如fibotestpassword,通过哈希算法对该IMEI、SN和明文密码进行计算,得到对应的哈希值即该主机的唯一认证密码例如FC751BE70E9D505F291D4B13E84F9887。随后,下发AT命令例如at+gtsetca=“868866050005276”,“FF22MJ0051”,“FC751BE70E9D505F291D4B13E84F9887”,并得到该AT命令的返回结果。此时,若返回结果为OK,则表示为主机写入唯一认证密码成功。需要说明的是,在主机生产过程中写入成功后,后续主机与外接设备的通信过程中,无需再次写入。
在某些实施方案中,以USB设备为例,USB设备插入主机后,主机与USB设备连接,主机与USB设备进行通信前,即主机下发目标命令给USB设备前,USB设备需对主机进行认证,认证成功后,USB设备与主机正常通信。随后,USB设备拔出主机即两者断开连接,则上一认证结果失效。在之后,若USB设备重新插入主机,则需要重新进行认证。此时,主机下发认证请求,该认证请求的形式可以是AT命令例如at+gtcheckca=“FC751BE70E9D505F291D4B13E84F9887”。若收到返回结果为OK,则表示安全认证成功,此时主机可下发目标命令给外接设备,该目标命令可以用于修改产线写trace AT,以修改工厂测试信息等,该目标命令可以为at+gttrace=1。最后,响应于该目标命令返回所有的trace信息,则表示修改成功。
在某些实施方案中,USB设备拔出主机即两者断开连接,则上一认证结果失效后,若USB设备重新插入主机,但主机未下发认证请求,也就是未重新进行认证。此时,下发修改产线写trace AT命令,例如at+gttrace=1,来修改工厂测试信息,则响应于该命令,返回ERROR,表示USB设备无法访问主机下发的命令,且主机显示权限受限,无法访问USB设备。
为了解决外接设备按照接收到的AT命令进行操作,可能会造成该AT命令中与外接设备相关的数据和信息泄露或被篡改,使得外接设备的安全性较低的问题,本公开实施例提供了一种安全认证方法,应用于安全认证系统中,如图4所示,该安全认证方法包括步骤401-步骤405:
步骤401:外接设备与主机连接;
步骤402:外接设备获取主机的目标端口;
步骤403:主机下发认证请求给外接设备;
步骤404:若外接设备未接收到主机下发的认证请求,则拒绝访问主机配置为下发给外接设备的目标命令;以及
步骤405:若外接设备接收到主机下发的认证请求,则基于认证请求确定是否访问目标命令。
相应的,外接设备通过目标端口从主机接收认证请求,并根据是否接收到认证请求,执行步骤404或步骤405。
在某些实施方案中,如图5所示,以外接设备为USB设备为例,USB设备枚举主机的USB-ACM端口,随后,主机通过USB-ACM端口发送唯一认证密码,使USB设备对主机访问权限进行认证。若通过认证,即认证成功,允许USB设备通过USB-ACM端口访问敏感数据或者工厂生产信息,即上述主机配置为下发给USB设备的目标命令;若未通过认证,即认证失败,则拒绝USB设备通过USB-ACM端口访问敏感数据或者工厂生产信息。
在某些实施方案中,目标命令为主机下发给外接设备的任一命令,也可以是主机下发给外接设备的高级命令。其中,高级命令用于修改外接设备的敏感数据(例如IMEI)或工厂生产信息。
在某些实施方案中,上述外接设备的工厂生产信息可为该外接设备的产品批次号、物料来源、工厂编号、工位编号、产品出厂信息以 及工厂验证结果等。
综上,在本公开中,外接设备在接收主机下发的所有目标命令前,
为了解决外接设备按照接收到的AT命令进行操作,可能会造成该AT命令中与外接设备相关的数据和信息泄露或被篡改,使得外接设备的安全性较低的问题,本公开实施例提供了安全认证系统,配置为实现上述安全认证方法,如图6所示,该安全认证系统600包括外接设备601与主机602。
其中,外接设备601接入主机602后,外接设备601与主机602通过主机上的目标端口进行通信。
外接设备601,配置为接入主机并获取主机的目标端口。
主机602,配置为连接外接设备,通过主机的目标端口下发认证请求给外接设备,便于外接设备根据是否通过目标端口接收到认证请求,确定是否访问主机配置为下发给外接设备的目标命令。
外接设备601,还配置为若通过目标端口未接收到主机下发的认证请求,则拒绝访问主机配置为下发给外接设备的目标命令;若通过目标端口接收到主机下发的认证请求,则基于认证请求确定是否访问目标命令。
在某些实施方案中,目标端口为USB端口,外接设备为通过USB端口接入主机的设备。
在某些实施方案中,该USB端口可以为USB-ACM端口。
如图7所示,本公开提供了安全认证装置700,该装置包括接入模块701和访问模块702。
其中,接入模块701,配置为接入主机并获取主机的目标端口;目标端口配置为外接设备与主机进行通信。
访问模块702,配置为若通过目标端口未接收到主机下发的认证请求,则拒绝访问主机配置为下发给外接设备的目标命令;若通过目标端口接收到主机下发的认证请求,则基于认证请求确定是否访问目标命令。
如图8所示,本公开提供了安全认证装置800,该装置包括连接模块801和下发模块802。
其中,连接模块801,配置为连接外接设备。
下发模块802,配置为通过主机的目标端口下发认证请求给外接设备,以便于外接设备根据是否通过目标端口接收到认证请求,确定是否访问主机配置为下发给外接设备的目标命令;目标端口配置为外接设备与主机进行通信。
如图9所示,本公开提供了电子设备900,其包括处理器901、通信接口902、存储器903和通信总线904,其中,处理器901,通信接口902,存储器903通过通信总线904完成相互间的通信,
存储器903,配置为存放计算机程序;
在某些实施方案中,处理器901,配置为执行存储器903上所存放的程序时,实现本公开提供的安全认证方法。
本公开实施例提供的电子设备900,可以为能够实现通信功能的模组或包含该模组的终端设备等,该终端设备可以为移动终端或智能终 端。移动终端具体可以为手机、平板电脑、笔记本电脑等中的至少一种;智能终端具体可以是智能汽车、智能手表、共享单车、智能柜等含有无线通信模组的终端;模组具体可以为无线通信模组,例如2G通信模组、3G通信模组、4G通信模组、5G通信模组、NB-IOT通信模组等中的任意一种。
本公开实施例还提供了计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如前述任意一个方法实施例提供的安全认证方法的步骤。
需要说明的是,在本文中,诸如“第一”和“第二”等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个......”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。
以上所述仅是本发明的具体实施方式,使本领域技术人员能够理解或实现本发明。对这些实施例的多种修改对本领域的技术人员来说将是显而易见的,本文中所定义的一般原理可以在不脱离本发明的精神或范围的情况下,在其它实施例中实现。因此,本发明将不会被限制于本文所示的这些实施例,而是要符合与本文所公开的原理和新颖特点相一致的最宽的范围。

Claims (13)

  1. 安全认证方法,其应用于外接设备中,所述方法包括:
    接入主机并获取所述主机的目标端口;所述目标端口配置为所述外接设备与所述主机进行通信;
    若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;以及
    若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
  2. 如权利要求1所述的安全认证方法,其中,
    所述认证请求包括所述主机的唯一认证密码;
    所述基于所述认证请求确定是否访问所述目标命令,包括:
    响应于接收到的认证请求,基于所述认证请求中所述主机的唯一认证密码对所述主机进行认证,得到认证结果;
    若所述认证结果为认证通过,则访问所述目标命令;以及
    若所述认证结果为认证未通过,则拒绝访问所述目标命令。
  3. 如权利要求1或2所述的安全认证方法,其中,在所述若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令之后,所述方法还包括:
    生成第一提示信息并将所述第一提示信息上报给所述主机,所述第一提示信息用于提示所述主机重新下发认证请求。
  4. 如权利要求2或3所述的安全认证方法,其中,在所述若所述认证结果为认证未通过,则拒绝访问所述目标命令之后,所述方法还包括:
    生成第二提示信息,并将所述第二提示信息上报给所述主机,所述第二提示信息用于提示所述主机认证失败;
    和/或,生成第三提示信息,并按照所述第三提示信息进行提示;所述第三提示信息用于提示拒绝访问所述主机配置为下发给所述外接设备的目标命令。
  5. 安全认证方法,其应用于主机中,所述方法包括:
    连接外接设备;以及
    通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所述外接设备的目标命令;所述目标端口 配置为所述外接设备与所述主机进行通信。
  6. 权利要求5所述的安全认证方法,其中,在所述通过主机的目标端口下发认证请求给所述外接设备之后,所述方法还包括:
    通过所述目标端口接收所述外接设备上报的第一提示信息,所述第一提示信息用于提示所述主机重新下发认证请求;响应于所述第一提示信息,重新向所述外接设备下发认证请求;
    或者,
    通过所述目标端口接收所述外接设备上报的第二提示信息,所述第二提示信息用于提示所述主机认证失败。
  7. 如权利要求5或6所述的安全认证方法,其中,在所述通过主机的目标端口下发认证请求给所述外接设备之前,所述方法还包括:
    获取所述主机的唯一认证密码;所述唯一认证密码为对所述主机的第一标识、所述主机的第二标识以及所述主机的预设密码进行哈希运算得到的哈希值;以及
    基于所述主机的唯一认证密码生成所述认证请求。
  8. 安全认证装置,其中,所述安全认证装置包括:
    接入模块,配置为接入主机并获取所述主机的目标端口;所述目标端口配置为所述外接设备与所述主机进行通信;以及
    访问模块,配置为若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
  9. 安全认证装置,其中,所述装置包括:
    连接模块,配置为连接外接设备;以及
    下发模块,配置为通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所述外接设备的目标命令;所述目标端口配置为所述外接设备与所述主机进行通信。
  10. 安全认证系统,其中,所述安全认证系统包括外接设备与主机;其中,所述外接设备接入所述主机后,所述外接设备与所述主机通过所述主机上的目标端口进行通信;
    所述外接设备,配置为接入所述主机并获取所述主机的目标端口;
    所述主机,配置为连接所述外接设备;通过主机的目标端口下发认证请求给所述外接设备,以便于所述外接设备根据是否通过所述目标端口接收到所述认证请求,确定是否访问所述主机配置为下发给所 述外接设备的目标命令;以及
    所述外接设备,还配置为若通过所述目标端口未接收到所述主机下发的认证请求,则拒绝访问所述主机配置为下发给所述外接设备的目标命令;若通过所述目标端口接收到所述主机下发的认证请求,则基于所述认证请求确定是否访问所述目标命令。
  11. 如权利要求10所述的安全认证系统,其中,所述目标端口为通用串行总线端口,所述外接设备为通过所述通用串行总线端口接入所述主机的设备。
  12. 电子设备,其包括处理器、通信接口、存储器和通信总线,其中,所述处理器,所述通信接口,所述存储器通过所述通信总线完成相互间的通信;
    存储器,配置为存放计算机程序;
    处理器,配置为执行存储器上所存放的程序时,实现权利要求1至7中任一权利要求所述的安全认证方法。
  13. 计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至7中任一权利要求所述的安全认证方法。
PCT/CN2023/088627 2022-05-09 2023-04-17 安全认证方法、装置、系统、电子设备及存储介质 WO2023216813A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210502208.8 2022-05-09
CN202210502208.8A CN114861158A (zh) 2022-05-09 2022-05-09 安全认证方法、装置、系统、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023216813A1 true WO2023216813A1 (zh) 2023-11-16

Family

ID=82636582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2023/088627 WO2023216813A1 (zh) 2022-05-09 2023-04-17 安全认证方法、装置、系统、电子设备及存储介质

Country Status (2)

Country Link
CN (1) CN114861158A (zh)
WO (1) WO2023216813A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117354069A (zh) * 2023-12-06 2024-01-05 自然资源陕西省卫星应用技术中心 一种基于数据湖的遥感数据管理系统及方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114861158A (zh) * 2022-05-09 2022-08-05 深圳市广和通无线通信软件有限公司 安全认证方法、装置、系统、电子设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593252A (zh) * 2009-05-27 2009-12-02 北京飞天诚信科技有限公司 一种计算机对usb设备进行访问的控制方法和系统
JP2011048526A (ja) * 2009-08-26 2011-03-10 Fujitsu Ltd 情報装置及び認証プログラム
US20210326459A1 (en) * 2020-04-21 2021-10-21 Microsoft Technology Licensing, Llc Secure access to accessory device resources
CN114861158A (zh) * 2022-05-09 2022-08-05 深圳市广和通无线通信软件有限公司 安全认证方法、装置、系统、电子设备及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101593252A (zh) * 2009-05-27 2009-12-02 北京飞天诚信科技有限公司 一种计算机对usb设备进行访问的控制方法和系统
JP2011048526A (ja) * 2009-08-26 2011-03-10 Fujitsu Ltd 情報装置及び認証プログラム
US20210326459A1 (en) * 2020-04-21 2021-10-21 Microsoft Technology Licensing, Llc Secure access to accessory device resources
CN114861158A (zh) * 2022-05-09 2022-08-05 深圳市广和通无线通信软件有限公司 安全认证方法、装置、系统、电子设备及存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117354069A (zh) * 2023-12-06 2024-01-05 自然资源陕西省卫星应用技术中心 一种基于数据湖的遥感数据管理系统及方法
CN117354069B (zh) * 2023-12-06 2024-02-13 自然资源陕西省卫星应用技术中心 一种基于数据湖的遥感数据管理系统及方法

Also Published As

Publication number Publication date
CN114861158A (zh) 2022-08-05

Similar Documents

Publication Publication Date Title
WO2023216813A1 (zh) 安全认证方法、装置、系统、电子设备及存储介质
CN112771826B (zh) 一种应用程序登录方法、应用程序登录装置及移动终端
KR101340838B1 (ko) 통신 인터페이스를 허가하는 방법 및 장치
CN112513857A (zh) 可信执行环境中的个性化密码安全访问控制
JP2023166562A (ja) 第1の要素非接触カード認証システムおよび方法
JP2017049988A (ja) アクセス制御を管理するためのポリシーベース技法
US9954850B2 (en) Service locking method, apparatuses and systems thereof
CA2646616A1 (en) Method and apparatus for secure management of debugging processes within communication devices
CN106059802B (zh) 一种终端接入认证方法及装置
US11409861B2 (en) Passwordless authentication
CN113132404B (zh) 身份认证方法、终端及存储介质
WO2019210579A1 (zh) 调用api接口的验证方法、装置、计算机设备和存储介质
WO2012139528A1 (zh) 授权方法和终端设备
US20230336982A1 (en) Virtual key sharing system and method
CN115462109A (zh) 对附件设备资源的安全访问
WO2023185492A1 (zh) 车辆控制器诊断方法、装置、设备和介质
CN112738021A (zh) 单点登录方法、终端、应用服务器、认证服务器及介质
US9455972B1 (en) Provisioning a mobile device with a security application on the fly
US20120023139A1 (en) Intelligent attached storage
CN113765655A (zh) 访问控制方法、装置、设备及存储介质
US11232220B2 (en) Encryption management for storage devices
US11782610B2 (en) Write and compare only data storage
US20230079795A1 (en) Device to device migration in a unified endpoint management system
CN114582048A (zh) 基于nfc的车门控制方法、移动终端及汽车
US11737155B2 (en) Communication with a data storage device using an emulated Wi-Fi captive portal

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23802588

Country of ref document: EP

Kind code of ref document: A1