CN102026188A - Authentication method, equipment and system - Google Patents

Authentication method, equipment and system Download PDF

Info

Publication number
CN102026188A
CN102026188A CN2010105950214A CN201010595021A CN102026188A CN 102026188 A CN102026188 A CN 102026188A CN 2010105950214 A CN2010105950214 A CN 2010105950214A CN 201010595021 A CN201010595021 A CN 201010595021A CN 102026188 A CN102026188 A CN 102026188A
Authority
CN
China
Prior art keywords
authentication
network gateway
sensor network
seed
factor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010105950214A
Other languages
Chinese (zh)
Inventor
贾雪琴
马书惠
周光涛
李建功
刘煜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN2010105950214A priority Critical patent/CN102026188A/en
Publication of CN102026188A publication Critical patent/CN102026188A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides an authentication method, equipment and system. The authentication method comprises the following steps: acquiring first current time and a first seed, wherein the first seed is random number which is randomly generated; carrying out key operation according to the first current time and the first seed, and acquiring a first key factor; and transmitting first authentication parameter information to a sensor network gateway so that the sensor network gateway authenticates the current sensor node, wherein the first authentication parameter information comprises a sensor node identification code and a first authentication factor, and the first authentication factor comprises the first seed and the first key factor. The technical scheme provided by the embodiment of the invention can provide effective authentication for the Internet of things with explosive growth of the sensor node (SN) quantity; and by utilizing the technical scheme provided by the embodiment of the invention, the safety of information transmission in the Internet of things can be ensured, and the service quality of the Internet of things can be effectively improved.

Description

Method for authenticating, equipment and system
Technical field
The present invention relates to technology of Internet of things, relate in particular to a kind of method for authenticating, equipment and system that is applied in the Internet of Things.
Background technology
Internet of Things is on the basis of existing network infrastructure and technology, and the entity (comprising people and thing) that will have networked capabilities couples together, and realizes transmission of inter-entity information and remote-operated networking.Therefore, we can say that Internet of Things is the extension of existing communication network.
Internet of Things is equivalent to sensor node (the Sensor Node that will have data-handling capacity and communication capacity in a large number; Hereinafter to be referred as SN) inserted in the communication network infrastructure.SN is specifically as follows the device of being made up of transducer with data-handling capacity and networking capabilities and actuator.Internet of Things can be divided into backbone network and tip network two parts.Wherein backbone network is the basic communication network under environment of internet of things, for example existing global mobile communication (Global System for MobileCommunications; GSM) network, worldwide interoperability for microwave inserts (WorldwideInteroperability for Microwave Access; Hereinafter to be referred as Wimax) network or the like.The tip network is by SN and transducer gateway (Sensor Network Gate under environment of internet of things; Hereinafter to be referred as SNG) the extension network formed.
At present, in the environment of internet of things, the quantity of SN inserts in the Internet of Things with explosive growth.For fail safe that guarantees message transmission in the Internet of Things network and the service quality that improves the Internet of Things network effectively, demand a kind of authentication scheme that applies in the Internet of Things network urgently.
Summary of the invention
The invention provides a kind of method for authenticating, equipment and system, in order to solve the defective that can't realize the sensor node of explosive growth is carried out authentication in the existing Internet of Things network, the fail safe of message transmission in the Internet of Things network can be guaranteed effectively, and the service quality of Internet of Things network can be improved effectively.
The invention provides a kind of method for authenticating, be applied to comprise in the Internet of Things:
Obtain first current time and first seed; Described first seed is the random number that produces at random;
Carry out the key computing according to described first current time and described first seed, obtain first cryptographic key factor;
Send the first authentication parameter information to sensor network gateway, current sensor node is carried out authentication for described sensor network gateway; The described first authentication parameter information comprises the sensor node identification code and comprises the first authentication factor of described first seed and described first cryptographic key factor.
The invention provides a kind of method for authenticating, be applied to comprise in the Internet of Things:
The first authentication parameter information that the receiving sensor node sends, the described first authentication parameter information comprises the sensor node identification code and the first authentication factor, and the described first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with described first seed and first current time;
Carry out authentication according to described sensor node identification code and the described sensor node of the described first authentication factor pair.
The invention provides a kind of method for authenticating, be applied to comprise in the Internet of Things:
The second authentication parameter information of the sensor network gateway that the receiving sensor network gateway sends; The described second authentication parameter information comprises the sensor network gateway identification code and the second authentication factor, and the described second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with described second seed and the 3rd current time;
Carry out authentication according to described sensor network gateway identification code and the described sensor network gateway of the described second authentication factor pair.
The invention provides a kind of sensor node equipment, comprising:
Acquisition module is used to obtain first current time and first seed; Described first seed is the random number that produces at random;
Described acquisition module also is used for carrying out the key computing according to described first current time and described first seed, obtains first cryptographic key factor;
Sending module is used for sending the first authentication parameter information to sensor network gateway, for described sensor network gateway current sensor node is carried out authentication; The described first authentication parameter information comprises the sensor node identification code and comprises the first authentication factor of described first seed and described first cryptographic key factor.
The invention provides a kind of sensor network gateway device, comprising:
Receiver module, be used for the first authentication parameter information that the receiving sensor node sends, the described first authentication parameter information comprises the sensor node identification code and the first authentication factor, and the described first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with described first seed and first current time;
Authentication module is used for carrying out authentication according to described sensor node identification code and the described sensor node of the described first authentication factor pair.
The invention provides a kind of AUC equipment, comprising:
Receiver module is used for the second authentication parameter information of the sensor network gateway that the receiving sensor network gateway sends; The described second authentication parameter information comprises the sensor network gateway identification code and the second authentication factor, and the described second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with described second seed and the 3rd current time;
Authentication module is used for carrying out authentication according to described sensor network gateway identification code and the described sensor network gateway of the described second authentication factor pair.
The present invention also provides a kind of right discriminating system, comprises the sensor node device, sensor network gateway device and AUC's equipment.
Method for authenticating of the present invention, equipment and system are by carrying out authentication according to the first authentication parameter information that sensor node sends to sensor node by sensor network gateway.But also comprise that AUC carries out the secondary authentication to sensor network gateway.Technical scheme of the present invention, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of the embodiment of the invention, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, to do one to the accompanying drawing of required use in embodiment or the description of the Prior Art below introduces simply, apparently, accompanying drawing in describing below is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain other accompanying drawing according to these accompanying drawings.
The flow chart of the method for authenticating that Fig. 1 provides for the embodiment of the invention one;
The flow chart of the method for authenticating that Fig. 2 provides for the embodiment of the invention two;
The flow chart of the method for authenticating that Fig. 3 provides for the embodiment of the invention three;
The flow chart of the method for authenticating that Fig. 4 provides for the embodiment of the invention four;
The flow chart of the method for authenticating that Fig. 5 provides for the embodiment of the invention five;
The signaling diagram of the method for authenticating that Fig. 6 provides for the embodiment of the invention six;
The structural representation of the SN equipment that Fig. 7 provides for the embodiment of the invention seven;
The structural representation of the SNG equipment that Fig. 8 provides for the embodiment of the invention eight;
The structural representation of the SNG equipment that Fig. 9 provides for the embodiment of the invention nine;
The structural representation of the AC equipment that Figure 10 provides for the embodiment of the invention ten;
The structural representation of the AC equipment that Figure 11 provides for the embodiment of the invention 11;
The structural representation of the right discriminating system that Figure 12 provides for the embodiment of the invention 12.
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the invention clearer, below in conjunction with the accompanying drawing in the embodiment of the invention, technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that is obtained under the creative work prerequisite.
The flow chart of the method for authenticating that Fig. 1 provides for the embodiment of the invention one.As shown in Figure 1, the executive agent of the method for authenticating of present embodiment is SN.As shown in Figure 1, the method for authenticating of present embodiment specifically can comprise the steps:
Step 100, obtain first current time and first seed;
Wherein this first seed is the random number that produces at random, can produce by a random sequence generator particularly.That is to say and in SN, can be provided with a random sequence generator.Simultaneously also need to obtain first current time, just current time here.A clock can be set particularly, so that obtained for first current time in SN.
Step 101, carry out the key computing according to first current time and first seed, obtain first cryptographic key factor;
Carry out the key computing according to step 100 first current time of obtaining and first seed that obtains particularly.For example can be according to the dynamic key algorithm, first seed that obtains with first current time and step 100 serves as that the key computing is carried out in input, obtains first cryptographic key factor.All dynamic key algorithms that relate in the embodiment of the invention specifically can be realized with reference to dynamic key algorithm of the prior art, give unnecessary details no longer in detail at this.Need to prove that in the certain hour section, with the input of the first identical seed as key algorithm, first cryptographic key factor that two secondary key computings obtain is identical.When surpassing the regular hour, with the input of the first identical seed as key algorithm, the result of calculation difference that two secondary key computings obtain.
Step 102, send the first authentication parameter information, current SN is carried out authentication for SNG to SNG; This first authentication parameter information comprises the SN identification code and comprises the first authentication factor of first seed and first cryptographic key factor.
Wherein the SN identification code is SN when registering at the SNG place first, is that SN distributes by SNG.It is that off-line carries out that SN registers first, after the registration, writes the SN identification code that SNG distributes for this SN in SN first.This SN identification code can comprise two parts: a preceding part is the SNG identification code of this SN correspondence; Second portion is a serial number, can be understood as the identification code of this SN under the SNG of correspondence, and this SNG identification code can be in order to this SNG in the unique identification Internet of Things network.For a plurality of SN under the same SNG, the serial number of each SN can be according to the order assignment that increases progressively or successively decrease.The SN identification code also can adopt other arbitrary modes to be provided with in the practical application, and the implicit therein SNG identification code that carries correspondence.
The method for authenticating of present embodiment, obtain the first authentication parameter information that comprises the SN identification code and comprise the first authentication factor of first seed and first cryptographic key factor by SN, and the first authentication parameter information sent to SNG, according to the first authentication parameter information SN is carried out authentication for SNG, whether can insert this SNG to judge SN.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The flow chart of the method for authenticating that Fig. 2 provides for the embodiment of the invention two.The executive agent of the method for authenticating of present embodiment is SNG.As shown in Figure 2, the method for authenticating of present embodiment specifically can comprise the steps:
The first authentication parameter information that step 200, reception SN send, this first authentication parameter information comprises the SN identification code and the first authentication factor, and this first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with first seed and first current time;
Step 201, carry out authentication according to the SN identification code and the first authentication factor pair SN.
Particularly, SNG receives the first authentication parameter information that SN sends in the present embodiment, and carries out authentication according to the SN identification code in the first authentication parameter information and first this SN of authentication factor pair, whether can insert this SNG to judge this SN.
The method for authenticating of present embodiment receives the first authentication parameter information that SN sends by SNG, and according to the first authentication parameter information SN is carried out authentication.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The flow chart of the method for authenticating that Fig. 3 provides for the embodiment of the invention three.The executive agent of the method for authenticating of present embodiment still is SNG.As shown in Figure 3, the method for authenticating of present embodiment specifically can comprise the steps:
The first authentication parameter information that step 300, reception SN send, this first authentication parameter information comprises the SN identification code and the first authentication factor, and this first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with first seed and first current time; Execution in step 301;
Step 301, from the SN identification code, obtain the SNG identification code; Execution in step 302;
Particularly, the implicit SNG identification code that carries correspondence in the SN identification code.For example can be set to the SNG identification code of correspondence in the preceding part of SN identification code according to the relevant record of embodiment one.In the practical application, also can adopt other modes implicit SN identification code in the SN identification code.After SNG receives the first authentication parameter information, from SN identification code wherein, obtain earlier corresponding SNG identification code.
Whether the SNG identification code that step 302, judgement get access to is consistent with the SNG identification code;
Particularly, just SNG judges that the SNG identification code obtain is whether consistent with the SNG identification code of self storage among the SNG from the first authentication parameter information.When unanimity, execution in step 303; When inconsistent, execution in step 304;
Step 303, obtained for second current time; Execution in step 305;
Step 304, send failed authentication message to SN;
Particularly, SN can know according to the failed authentication message that receives and can not insert this SNG.
Step 305, carry out the key computing, obtain second cryptographic key factor according to first seed in second current time and the first authentication factor; Execution in step 306;
Particularly, according to the dynamic key algorithm, serve as that the key computing is carried out in input with first seed in the first authentication factor in second current time and the first authentication parameter information, obtain second cryptographic key factor., can not repeat them here in detail with reference to foregoing description with to obtain the acquisition process of first cryptographic key factor identical in the foregoing description one.
Step 306, judge whether second cryptographic key factor equals first cryptographic key factor; When equaling, determine the success of SN authentication, execution in step 307; Otherwise, when being not equal to, determine to the SN failed authentication execution in step 304;
Step 307, send the authentication success message to SN.
The method for authenticating of present embodiment receives the first authentication parameter information that SN sends by SNG, and according to the first authentication parameter information SN is carried out authentication.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
Need to prove, on the basis of the foregoing description, after SNG is to the success of SN authentication, can also comprise the steps:
(1) obtains the 3rd current time and second seed; This second seed is the random number that produces at random;
(2) carry out the key computing according to described the 3rd current time and second seed, obtain the 3rd cryptographic key factor;
(3) to (the Authentication centre of AUC; Hereinafter to be referred as AC) send the second authentication parameter information of SNG, according to the second authentication parameter information SNG is carried out authentication for AC; This second authentication parameter information comprises the SNG identification code and comprises the second authentication factor of second seed and the 3rd cryptographic key factor.
Particularly, this AC specifically is arranged in networks such as basic communication network such as GSM, and the SNG that is mainly used in inserting in the basic communication network network carries out authentication.Adopt this scheme, by AC SNG is carried out authentication, expanded the managerial ability of Internet of Things to sensor node, the sensor node that makes tradition be limited to the local area network (LAN) scope possesses the ability that inserts Internet of Things.And guaranteed the fail safe of message transmission in the Internet of Things network, and can improve the service quality of Internet of Things network effectively.
The flow chart of the method for authenticating that Fig. 4 provides for the embodiment of the invention four.The executive agent of the method for authenticating of present embodiment is AC.As shown in Figure 4, the method for authenticating of present embodiment specifically can comprise the steps:
The second authentication parameter information that step 400, reception SNG send; This second authentication parameter information comprises the SNG identification code and the second authentication factor, and this second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with this second seed and the 3rd current time;
Step 401, carry out authentication according to the SNG identification code and the second authentication factor pair SNG.
Particularly, AC receives the second authentication parameter information that SNG sends in the present embodiment, and carries out authentication according to the SNG identification code in the second authentication parameter information and second this SNG of authentication factor pair, has further expanded the managerial ability of AC to SNG.
The method for authenticating of present embodiment receives the second authentication parameter information that SNG sends by AC, and according to the second authentication parameter information SNG is carried out authentication.The technical scheme of present embodiment can strengthen the management of AC to SNG.By adopting the technical scheme of present embodiment, can guarantee the fail safe of message transmission in the Internet of Things network, and can improve the service quality of Internet of Things network effectively.
The flow chart of the method for authenticating that Fig. 5 provides for the embodiment of the invention five.The executive agent of the method for authenticating of present embodiment still is AC.As shown in Figure 5, the method for authenticating of present embodiment specifically can comprise the steps:
Second authentication parameter that step 500, reception SNG send, this second authentication parameter information comprises the SNG identification code and the second authentication factor, and the second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with this second seed and the 3rd current time; Execution in step 501;
Whether the SNG identification code that step 501, judgement receive is consistent with the identification code of SNG; When unanimity, execution in step 502; Otherwise when inconsistent, execution in step 503;
Step 502, obtained for the 4th current time; Execution in step 504;
Step 503, send failed authentication message to SNG;
Step 504, carry out the key computing, obtain the 4th cryptographic key factor according to second seed in the 4th current time and the second authentication factor; Execution in step 505;
Step 505, judge whether the 4th cryptographic key factor equals the 3rd cryptographic key factor; If equal, determine the success of SNG authentication; Execution in step 506; Otherwise, when being not equal to, determine to the SNG failed authentication execution in step 503;
Step 506, send the authentication success message to SNG.
The method for authenticating of present embodiment, receive the second authentication parameter information that SNG sends by AC, and SNG is carried out authentication according to the second authentication parameter information, and having expanded the managerial ability of Internet of Things to SN, the SN that makes tradition be limited to the local area network (LAN) scope possesses the ability that inserts Internet of Things.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The signaling diagram of the method for authenticating that Fig. 6 provides for the embodiment of the invention six.As shown in Figure 6, the method for authenticating of present embodiment specifically can comprise the steps:
Step 600, SN send the first authentication parameter information to SNG; Execution in step 601;
Wherein this first authentication parameter information comprises the SN identification code and the first authentication factor, and this first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with first seed and first current time.
Step 601, SNG carry out authentication to SN; When authentication is passed through, execution in step 602;
SNG can be referred to as first order authentication in the Internet of Things to the authentication of SN.Concrete authentication process can not repeat them here with reference to above-mentioned related embodiment two or three record.
Step 602, SNG send the authentication success message to SN; Execution in step 603;
Here be to be example successfully to the SN authentication with SNG, in the practical application, SNG to the SN authentication by the time, SNG sends failed authentication message to SN.
When SNG is successful to the SN authentication, can determine that this SN is legal in the Internet of Things.
Step 603, SNG send the second authentication parameter information to AC; Execution in step 604;
Wherein this second authentication parameter information comprises the SNG identification code and the second authentication factor, and this second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with this second seed and the 3rd current time.This step 603 begins to carry out second level authentication.
Step 604, AC carry out authentication to SNG; When authentication is passed through, execution in step 605;
AC can be referred to as second level authentication in the Internet of Things to the authentication of SNG.Concrete authentication process can not repeat them here with reference to above-mentioned related embodiment four or five record.
Step 605, AC send the authentication success message to SNG; Execution in step 606;
Step 606, SNG send AC to SNG authentication success message to SN; To inform SN, AC is to the success of SNG authentication.This moment, SN was successful to the two-stage authentication of AC, and this moment, SN can insert in the Internet of Things network.Here be to inform that a SN is an example.SNG can inform by each SN SNG authentication, under the SNG coverage in the practical application.
Here be successfully to be example to the SNG authentication with AC.In step 604, when AC did not pass through the SNG authentication, AC can send failed authentication message to SNG, SNG can send AC to SNG failed authentication message to SN then, and to inform SN, AC is to the SNG failed authentication, this moment SN can not to insert in the Internet of Things be not the reason of SN, but the reason of SNG.
Through above-mentioned two-stage success authentication, legal SN just can the admixture networking in.
The method for authenticating of present embodiment, SNG are responsible for SN is carried out first order authentication, and AC is responsible for SNG is carried out second level authentication, thereby form the two-stage authentication of Internet of Things.The method for authenticating of present embodiment to the two-stage authentication mechanism of Internet of Things, has been expanded the managerial ability of Internet of Things to sensor node, and the SN that makes tradition be limited to the local area network (LAN) scope possesses the ability that inserts Internet of Things.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be finished by the relevant hardware of program command, aforesaid program can be stored in the computer read/write memory medium, this program is carried out the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
The structural representation of the SN equipment that Fig. 7 provides for the embodiment of the invention seven.As shown in Figure 7, the SN equipment of present embodiment specifically can comprise: acquisition module 10 and sending module 11.
Acquisition module 10 in the SN equipment of present embodiment is used to obtain first current time and first seed; Wherein first seed is the random number that produces at random.This acquisition module 10 also is used for carrying out the key computing according to first current time and first seed, obtains first cryptographic key factor.Sending module 11 is connected with acquisition module 10, and sending module 11 is used for sending the first authentication parameter information that acquisition module 10 obtains to SNG, for SNG current SN is carried out authentication; Wherein this first authentication parameter information comprises the SN identification code and the first authentication factor that comprises first seed and first cryptographic key factor.
The SN equipment of present embodiment is realized method for authenticating by adopting above-mentioned module, realizes the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The SN equipment of present embodiment, realize obtaining the first authentication parameter information that comprises the SN identification code and comprise the first authentication factor of first seed and first cryptographic key factor by above-mentioned module by SN, and the first authentication parameter information sent to SNG, according to the first authentication parameter information SN is carried out authentication for SNG, whether can insert this SNG to judge SN.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
Need to prove that wherein acquisition module 10 can also specifically be used for according to the dynamic key algorithm, serves as that the key computing is carried out in input with first current time and first seed, obtains first cryptographic key factor.Can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The structural representation of the SNG equipment that Fig. 8 provides for the embodiment of the invention eight.As shown in Figure 8, the SNG equipment of present embodiment specifically can comprise: receiver module 20 and authentication module 21.
Receiver module 20 is used to receive the first authentication parameter information that SN sends, wherein this first authentication parameter information comprises the SN identification code and the first authentication factor, and this first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with this first seed and first current time.Authentication module 21 is connected with receiver module 20, and authentication module 21 is used for carrying out authentication according to the SN identification code and the first authentication factor pair SN that receiver module 20 receives.
The SNG equipment of present embodiment is realized method for authenticating by adopting above-mentioned module, realizes the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The SNG equipment of present embodiment is realized receiving the first authentication parameter information that SN sends by SNG by above-mentioned module, and according to the first authentication parameter information SN is carried out authentication.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The structural representation of the SNG equipment that Fig. 9 provides for the embodiment of the invention nine.As shown in Figure 9, the SNG equipment of present embodiment specifically can comprise on the basis of the foregoing description: authentication module 21 specifically can comprise: acquiring unit 211 and judging unit 212.
Acquiring unit 211 is connected with receiver module 20, and acquiring unit 211 is used for obtaining the SNG identification code from the SN sign that receiver module 20 receives.Judging unit 212 is connected with acquiring unit 211, and judging unit 212 is used to judge whether the SNG identification code that acquiring unit 211 obtains is consistent with the identification code of SNG.Wherein acquiring unit 211 also is used for obtaining for second current time if judging unit 212 judges that the SNG identification code that obtains is consistent with the identification code of SNG.Acquiring unit 211 further also is used for carrying out the key computing according to first seed of second current time and the first authentication factor, obtains second cryptographic key factor.Judging unit 212 is used to also judge whether second cryptographic key factor that acquiring unit 211 obtains equals first cryptographic key factor; If equal, determine the success of SN authentication; Otherwise, when being not equal to, determine the SN failed authentication.
Wherein acquiring unit 211 specifically is used for according to the dynamic key algorithm, serves as that the key computing is carried out in input with first seed in second current time and the first authentication factor, obtains second cryptographic key factor.
As shown in Figure 9, the SNG equipment of present embodiment also comprises sending module 22.This sending module 22 is connected with judging unit 212, and this sending module 22 is used for sending the authentication success to SN when judging unit 212 is determined the success of SN authentication; Perhaps when judging unit 212 is determined the SN failed authentication, send failed authentication message to SN.This sending module 22 also is used for judging if the SNG identification code is incorrect when judging unit 212, that is to say, when judging unit 212 judges that SNG identification code that acquiring units 211 obtain is with the identification code of SNG when inconsistent, to SN sensor node transmission failed authentication message.
As shown in Figure 9, the SNG equipment of present embodiment also comprises acquisition module 23.Wherein acquisition module 23 is connected with judging unit 212, and acquisition module 23 is used for obtaining the 3rd current time and second seed after judging unit 212 is determined the success of SN authentication; This second seed is the random number that produces at random.Acquisition module 23 also is used for carrying out the key computing according to the 3rd current time and second seed, obtains the 3rd cryptographic key factor.Sending module 22 also is connected with acquisition module 23.Sending module 22 is used for sending to AC the second authentication parameter information of SNG, according to this second authentication parameter information SNG is carried out authentication for AC; This second authentication parameter information comprises the SNG identification code and comprises second seed that acquisition module 23 obtains and the second authentication factor of the 3rd cryptographic key factor.
The SNG equipment of present embodiment is realized method for authenticating by adopting above-mentioned module, realizes the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The SNG equipment of present embodiment is realized receiving the first authentication parameter information that SN sends by SNG by above-mentioned module, and according to the first authentication parameter information SN is carried out authentication.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The structural representation of the AC equipment that Figure 10 provides for the embodiment of the invention ten.As shown in figure 10, the AC equipment of present embodiment specifically can comprise receiver module 30 and authentication module 31.
The receiver module 30 of the AC equipment of present embodiment is used to receive the second authentication parameter information of the SNG that SNG sends; Wherein the second authentication parameter information comprises the SNG identification code and the second authentication factor, and wherein the second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with second seed and the 3rd current time.Authentication module 31 is connected with receiver module 30, and authentication module 31 is used for carrying out authentication according to the SNG identification code and the second authentication factor pair SNG that receiver module 30 receives.
The AC equipment of present embodiment is realized method for authenticating by adopting above-mentioned module, realizes the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The AC equipment of present embodiment is realized receiving the second authentication parameter information that SNG sends by AC by above-mentioned module, and according to the second authentication parameter information SNG is carried out authentication.The technical scheme of present embodiment can strengthen the management of AC to SNG.By adopting the technical scheme of present embodiment, can guarantee the fail safe of message transmission in the Internet of Things network, and can improve the service quality of Internet of Things network effectively.
The structural representation of the AC equipment that Figure 11 provides for the embodiment of the invention 11.As shown in figure 11, the AC equipment of present embodiment is on the basis of the foregoing description ten, and wherein authentication module 31 specifically can comprise: acquiring unit 311 and judging unit 312.
Acquiring unit 311 in the AC equipment of present embodiment is connected with receiver module 30, and acquiring unit 311 is used for obtaining the SNG identification code from the second authentication parameter information that receiver module 30 receives; Judging unit 312 is connected with acquiring unit 311, and judging unit 312 is used for judging whether the identification code of the SNG that SNG identification code that acquiring unit 311 obtains and AC equipment are stored is consistent; Acquiring unit 311 also is used for obtaining for the 4th current time if judging unit 312 is judged when the identification code of the SNG that SNG identification code that acquiring units 311 obtain and AC equipment are stored is consistent.Acquiring unit 311 also is used for carrying out the key computing according to the 4th current time of obtaining and second seed of the second authentication factor, obtains the 4th cryptographic key factor.Judging unit 312 is used to also judge whether the 4th cryptographic key factor that acquiring unit 311 obtains equals the 3rd cryptographic key factor; If equal, determine the success of SNG authentication; Otherwise, when being not equal to, determine the SNG failed authentication.
The AC equipment of present embodiment also comprises sending module 32.Sending module 32 is connected with judging unit 312, and sending module 32 is used for judging unit 312 when determining the success of SNG authentication, sends the authentication success to SNG, sends the information of AC to the success of SNG authentication for SNG to the SN of correspondence; Perhaps be used for when determining, sending failed authentication message, send the information of AC to the SN of correspondence the SNG failed authentication for SNG to SNG to the SNG failed authentication.
The AC equipment of present embodiment is realized method for authenticating by adopting above-mentioned module, realizes the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The AC equipment of present embodiment, by adopting above-mentioned module to realize receiving the second authentication parameter information that SNG sends by AC, and SNG is carried out authentication according to the second authentication parameter information, expanded the managerial ability of Internet of Things to SN, the SN that makes tradition be limited to the local area network (LAN) scope possesses the ability that inserts Internet of Things.The technical scheme of present embodiment, can provide authentication effectively for the existing sensors number of nodes with the Internet of Things network of explosive growth, by adopting the technical scheme of present embodiment, the fail safe of message transmission in the Internet of Things network can be guaranteed, and the service quality of Internet of Things network can be improved effectively.
The structural representation of the right discriminating system that Figure 12 provides for the embodiment of the invention 12.As shown in figure 12, the right discriminating system of present embodiment comprises SN equipment 40, SNG equipment 50 and AC equipment 60.
SN equipment 40 can be used to obtain first current time and first seed; Wherein this first seed is the random number that produces at random.And carry out the key computing according to first current time and first seed, obtain first cryptographic key factor; Send the first authentication parameter information to SNG equipment 50 at last; Wherein the first authentication parameter information comprises the SN identification code and the first authentication factor that comprises first seed and first cryptographic key factor.
SNG equipment 50 is connected with SN equipment 40, SNG equipment 50 receives the first authentication parameter information that SN equipment 40 sends, wherein the first authentication parameter information comprises SN equipment 40 identification codes and the first authentication factor, and this first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with first seed and first current time; And carry out authentication according to the SN identification code and the first authentication factor pair SN.
After 50 pairs of SN equipment 40 authentications successes of SNG equipment, SNG equipment 50 also is used to obtain the 3rd current time and second seed; Wherein second seed is the random number that produces at random; Carry out the key computing according to the 3rd current time and second seed, obtain the 3rd cryptographic key factor; To the second authentication parameter information of AC equipment 60 transmission SNG equipment 50, according to the second authentication parameter information SNG equipment 50 is carried out authentication for AC equipment 60; This second authentication parameter information comprises the SNG identification code and comprises the second authentication factor of second seed and the 3rd cryptographic key factor.
AC equipment 60 is connected with SNG equipment 50, and AC equipment 60 is used to receive the second authentication parameter information of the SNG that SNG equipment sends; This second authentication parameter information comprises the SNG identification code and the second authentication factor, and this second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with second seed and the 3rd current time; Carry out authentication according to the SNG identification code and the second authentication factor pair SNG.
SN equipment 40 in the right discriminating system of present embodiment specifically can adopt the described SN equipment of above-mentioned related embodiment.SNG equipment 50 in the right discriminating system of present embodiment specifically can adopt the described SNG equipment of above-mentioned related embodiment.AC equipment 60 in the right discriminating system of present embodiment specifically can adopt the described AC equipment of above-mentioned related embodiment.
The right discriminating system of present embodiment is realized method for authenticating by adopting above-mentioned SN equipment 40, SNG equipment 50 and AC equipment 60, realize the machine-processed identical of authentication with above-mentioned correlation technique embodiment, can not repeat them here with reference to the record of above-mentioned correlation technique embodiment in detail.
The right discriminating system of present embodiment, SNG equipment are responsible for SN equipment is carried out first order authentication, and AC equipment is responsible for SNG equipment is carried out second level authentication, thereby form the two-stage authentication of Internet of Things.The right discriminating system of present embodiment to the two-stage authentication mechanism of Internet of Things, has been expanded the managerial ability of Internet of Things to sensor node, and the SN equipment that makes tradition be limited to the local area network (LAN) scope possesses the ability that inserts Internet of Things.
Device embodiment described above only is schematic, wherein the unit as the separating component explanation can or can not be physically to separate also, the parts that show as the unit can be or can not be physical locations also, promptly can be positioned at a place, perhaps also can be distributed at least two network element.Can select wherein some or all of module to realize the purpose of present embodiment scheme according to the actual needs.Those of ordinary skills promptly can understand and implement under the situation of not paying performing creative labour.
It should be noted that at last: above embodiment only in order to technical scheme of the present invention to be described, is not intended to limit; Although with reference to previous embodiment the present invention is had been described in detail, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these modifications or replacement do not make the essence of appropriate technical solution break away from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (22)

1. a method for authenticating is applied to it is characterized in that in the Internet of Things, comprising:
Obtain first current time and first seed; Described first seed is the random number that produces at random;
Carry out the key computing according to described first current time and described first seed, obtain first cryptographic key factor;
Send the first authentication parameter information to sensor network gateway, current sensor node is carried out authentication for described sensor network gateway; The described first authentication parameter information comprises the sensor node identification code and comprises the first authentication factor of described first seed and described first cryptographic key factor.
2. method for authenticating according to claim 1, it is characterized in that, describedly carry out the key computing according to described first current time and described first seed, obtain first cryptographic key factor, be specially: according to the dynamic key algorithm, with described first current time and described first seed serves as that the key computing is carried out in input, obtains described first cryptographic key factor.
3. a method for authenticating is applied to it is characterized in that in the Internet of Things, comprising:
The first authentication parameter information that the receiving sensor node sends, the described first authentication parameter information comprises the sensor node identification code and the first authentication factor, and the described first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with described first seed and first current time;
Carry out authentication according to described sensor node identification code and the described sensor node of the described first authentication factor pair.
4. method for authenticating according to claim 3 is characterized in that, describedly carries out authentication according to described sensor node identification code and the described sensor node of the described first authentication factor pair, specifically comprises:
From described sensor node sign, obtain the sensor network gateway identification code;
Judge whether the described sensor network gateway identification code that obtains is consistent with the identification code of described sensor network gateway;
If the described sensor network gateway identification code that obtains is consistent with the identification code of described sensor network gateway, obtained for second current time;
Carry out the key computing according to described first seed in described second current time and the described first authentication factor, obtain second cryptographic key factor;
Judge whether described second cryptographic key factor equals described first cryptographic key factor; If equal, determine described sensor node authentication success; Otherwise, when being not equal to, determine described sensor node failed authentication.
5. method for authenticating according to claim 4 is characterized in that, also comprises: when determining described sensor node authentication success, send the authentication success message to described sensor node.
6. method for authenticating according to claim 4 is characterized in that, also comprises: when determining described sensor node failed authentication, send failed authentication message to described sensor node.
7. method for authenticating according to claim 4, it is characterized in that, carry out the key computing according to described first seed in described second current time and the described first authentication factor, obtain second cryptographic key factor, specifically comprise: according to the dynamic key algorithm, with described first seed in described second current time and the described first authentication factor serves as that the key computing is carried out in input, obtains described second cryptographic key factor.
8. according to the arbitrary described method for authenticating of claim 4-7, it is characterized in that, also comprise:
After determining, obtain the 3rd current time and second seed to described sensor node authentication success; Described second seed is the random number that produces at random;
Carry out the key computing according to described the 3rd current time and described second seed, obtain the 3rd cryptographic key factor;
To the second authentication parameter information of AUC's transmission sensor network gateway, according to the described second authentication parameter information described sensor network gateway is carried out authentication for described AUC; The described second authentication parameter information comprises the sensor network gateway identification code and comprises the second authentication factor of described second seed and described the 3rd cryptographic key factor.
9. a method for authenticating is applied to it is characterized in that in the Internet of Things, comprising:
The second authentication parameter information of the sensor network gateway that the receiving sensor network gateway sends; The described second authentication parameter information comprises the sensor network gateway identification code and the second authentication factor, and the described second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with described second seed and the 3rd current time;
Carry out authentication according to described sensor network gateway identification code and the described sensor network gateway of the described second authentication factor pair.
10. method for authenticating according to claim 9 is characterized in that, describedly carries out authentication according to described sensor network gateway identification code and the described sensor network gateway of the described second authentication factor pair, specifically comprises:
Judge whether the described sensor network gateway identification code that receives is consistent with the identification code of described sensor network gateway;
If the described sensor network gateway identification code that receives is consistent with the identification code of described sensor network gateway, obtained for the 4th current time;
Carry out the key computing according to described second seed in described the 4th current time and the described second authentication factor, obtain the 4th cryptographic key factor;
Judge whether described the 4th cryptographic key factor equals described the 3rd cryptographic key factor; If equal, determine described sensor network gateway authentication success; Otherwise, when being not equal to, determine described sensor network gateway failed authentication.
11. method for authenticating according to claim 10 is characterized in that, also comprises:
When determining to described sensor network gateway authentication success, send the authentication success message to described sensor network gateway, send the information of AUC to the corresponding sensor node the success of described sensor network gateway authentication for described sensor network gateway; Perhaps when determining to described sensor network gateway failed authentication, send failed authentication message to described sensor network gateway, send described AUC to described sensor network gateway failed authentication information to the corresponding sensor node for described sensor network gateway.
12. a sensor node equipment is characterized in that, comprising:
Acquisition module is used to obtain first current time and first seed; Described first seed is the random number that produces at random;
Described acquisition module also is used for carrying out the key computing according to described first current time and described first seed, obtains first cryptographic key factor;
Sending module is used for sending the first authentication parameter information to sensor network gateway, for described sensor network gateway current sensor node is carried out authentication; The described first authentication parameter information comprises the sensor node identification code and comprises the first authentication factor of described first seed and described first cryptographic key factor.
13. sensor node equipment according to claim 12, it is characterized in that described acquisition module specifically is used for according to the dynamic key algorithm, with described first current time and described first seed serves as that the key computing is carried out in input, obtains described first cryptographic key factor.
14. a sensor network gateway device is characterized in that, comprising:
Receiver module, be used for the first authentication parameter information that the receiving sensor node sends, the described first authentication parameter information comprises the sensor node identification code and the first authentication factor, and the described first authentication factor comprises first seed and serves as that first cryptographic key factor that the key computing obtains is carried out in input with described first seed and first current time;
Authentication module is used for carrying out authentication according to described sensor node identification code and the described sensor node of the described first authentication factor pair.
15. sensor network gateway device according to claim 14 is characterized in that, described authentication module specifically comprises:
Acquiring unit is used for obtaining the sensor network gateway identification code from described sensor node sign;
Judging unit is used to judge whether the described sensor network gateway identification code that obtains is consistent with the identification code of described sensor network gateway;
Described acquiring unit also is used for obtaining for second current time if the described sensor network gateway identification code that obtains is consistent with the identification code of described sensor network gateway;
Described acquiring unit also is used for carrying out the key computing according to described first seed of described second current time and the described first authentication factor, obtains second cryptographic key factor;
Described judging unit is used to also judge whether described second cryptographic key factor equals described first cryptographic key factor; If equal, determine described sensor node authentication success; Otherwise, when being not equal to, determine described sensor node failed authentication.
16. sensor network gateway device according to claim 15 is characterized in that, also comprises:
Sending module is used for sending the authentication success to described sensor node when determining described sensor node authentication success; Perhaps when determining, send failed authentication message to described sensor node to described sensor node failed authentication;
Described sending module also is used for sending failed authentication message if described sensor network gateway identification code is incorrect to described sensor node.
17. sensor network gateway device according to claim 15, it is characterized in that, described acquiring unit, specifically be used for according to the dynamic key algorithm, with described first seed in described second current time and the described first authentication factor serves as that the key computing is carried out in input, obtains described second cryptographic key factor.
18. according to the arbitrary described sensor network gateway device of claim 14-17, it is characterized in that, also comprise: acquisition module;
Described acquisition module is used for obtaining the 3rd current time and second seed after determining described sensor node authentication success; Described second seed is the random number that produces at random;
Described acquisition module also is used for carrying out the key computing according to described the 3rd current time and described second seed, obtains the 3rd cryptographic key factor;
Described sending module is used for the second authentication parameter information to AUC's transmission sensor network gateway, according to the described second authentication parameter information described sensor network gateway is carried out authentication for described AUC; The described second authentication parameter information comprises the sensor network gateway identification code and comprises the second authentication factor of described second seed and described the 3rd cryptographic key factor.
19. AUC's equipment is characterized in that, comprising:
Receiver module is used for the second authentication parameter information of the sensor network gateway that the receiving sensor network gateway sends; The described second authentication parameter information comprises the sensor network gateway identification code and the second authentication factor, and the described second authentication factor comprises second seed and serves as that the 3rd cryptographic key factor that the key computing obtains is carried out in input with described second seed and the 3rd current time;
Authentication module is used for carrying out authentication according to described sensor network gateway identification code and the described sensor network gateway of the described second authentication factor pair.
20. AUC according to claim 19 equipment is characterized in that, described authentication module comprises:
Acquiring unit is used for obtaining described sensor network gateway identification code from the described second authentication parameter information;
Judging unit is used for judging whether the identification code of the described sensor network gateway that described sensor network gateway identification code and AUC equipment are stored is consistent;
Described acquiring unit also is used for if obtain the identification code of the described sensor network gateway that described sensor network gateway identification code and described AUC equipment stores consistently, obtains for the 4th current time;
Described acquiring unit also is used for carrying out the key computing according to described second seed of described the 4th current time and the described second authentication factor, obtains the 4th cryptographic key factor;
Described judging unit is used to also judge whether described the 4th cryptographic key factor equals described the 3rd cryptographic key factor; If equal, determine described sensor network gateway authentication success; Otherwise, when being not equal to, determine described sensor network gateway failed authentication.
21. AUC according to claim 20 equipment, it is characterized in that, also comprise: sending module, be used for when determining described sensor network gateway authentication success, send the authentication success message to described sensor network gateway, send the information of AUC to the corresponding sensor node the success of described sensor network gateway authentication for described sensor network gateway; Perhaps be used for when determining described sensor network gateway failed authentication, send failed authentication message to described sensor network gateway, send the information of AUC to the corresponding sensor node described sensor network gateway failed authentication for described sensor network gateway.
22. a right discriminating system is characterized in that, comprises the arbitrary described sensor node equipment of claim 12-13, the arbitrary described sensor network gateway device of claim 14-18 and the arbitrary described AUC of claim 19-21 equipment.
CN2010105950214A 2010-12-09 2010-12-09 Authentication method, equipment and system Pending CN102026188A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010105950214A CN102026188A (en) 2010-12-09 2010-12-09 Authentication method, equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010105950214A CN102026188A (en) 2010-12-09 2010-12-09 Authentication method, equipment and system

Publications (1)

Publication Number Publication Date
CN102026188A true CN102026188A (en) 2011-04-20

Family

ID=43866904

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010105950214A Pending CN102026188A (en) 2010-12-09 2010-12-09 Authentication method, equipment and system

Country Status (1)

Country Link
CN (1) CN102026188A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497398A (en) * 2011-11-30 2012-06-13 中国联合网络通信集团有限公司 Sensor authentication method and system
WO2014048236A1 (en) * 2012-09-26 2014-04-03 中兴通讯股份有限公司 Method and apparatus for registering terminal
CN103916851A (en) * 2013-01-06 2014-07-09 华为终端有限公司 Safety certification method, device and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1571409A (en) * 2003-07-25 2005-01-26 华为技术有限公司 A method of safety authentication between media gateway and media gateway controller
CN101272251A (en) * 2007-03-22 2008-09-24 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101778102A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Safety authentication method of sensor, sensor and authentication system thereof
CN101895888A (en) * 2010-07-30 2010-11-24 ***通信集团重庆有限公司 Sensor authentication method, device and sensor authentication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1571409A (en) * 2003-07-25 2005-01-26 华为技术有限公司 A method of safety authentication between media gateway and media gateway controller
CN101272251A (en) * 2007-03-22 2008-09-24 华为技术有限公司 Authentication and cryptographic key negotiation method, authentication method, system and equipment
CN101778102A (en) * 2009-12-31 2010-07-14 卓望数码技术(深圳)有限公司 Safety authentication method of sensor, sensor and authentication system thereof
CN101895888A (en) * 2010-07-30 2010-11-24 ***通信集团重庆有限公司 Sensor authentication method, device and sensor authentication system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102497398A (en) * 2011-11-30 2012-06-13 中国联合网络通信集团有限公司 Sensor authentication method and system
CN102497398B (en) * 2011-11-30 2014-09-17 中国联合网络通信集团有限公司 Sensor authentication method and system
WO2014048236A1 (en) * 2012-09-26 2014-04-03 中兴通讯股份有限公司 Method and apparatus for registering terminal
US9479477B2 (en) 2012-09-26 2016-10-25 Zte Corporation Method and apparatus for registering terminal
CN103916851A (en) * 2013-01-06 2014-07-09 华为终端有限公司 Safety certification method, device and system
CN103916851B (en) * 2013-01-06 2017-08-18 华为终端有限公司 A kind of method of safety certification, equipment and system
US9756504B2 (en) 2013-01-06 2017-09-05 Huawei Device Co., Ltd. Security authentication method, device, and system

Similar Documents

Publication Publication Date Title
CN102823222B (en) For the method being identified and verifying RFID tags by reader
CN111383021B (en) Node management method, device, equipment and medium based on block chain network
Kong et al. A parallel identification protocol for RFID systems
Sujihelen et al. Node replication attack detection in distributed wireless sensor networks
US20080262798A1 (en) Method and system for performing distributed verification with respect to measurement data in sensor network
CN103078741B (en) A kind of RFID bidirectional identification protocol method
CN107800795A (en) The processing method and processing device of block information
CN107634964B (en) WAF (Wireless Access Filter) testing method and device
CN108769973B (en) Privacy protection method of Bluetooth equipment
CN102804678A (en) Process for mutually authenticating a reader and a radio tag
CN101741820B (en) Method, system and device for recognizing and determining color graphic adapter (CGA) public key
CN107784247B (en) Anonymous radio frequency identification system phased loss key tag identification method
US8581751B2 (en) Multi-cell voltage secure data encoding in hybrid vehicles
CN112764997B (en) Log storage method and device, computer equipment and storage medium
CN106650496A (en) Data processing method and device
CN103414641B (en) Neighbor table item release, device and the network equipment
CN102026188A (en) Authentication method, equipment and system
US20160006814A1 (en) Method for propagating network management data for energy-efficient iot network management and energy-efficient iot node apparatus
CN110619022B (en) Node detection method, device, equipment and storage medium based on block chain network
CN113645278B (en) Cross-chain message transmission method, device and storage medium of block chain
US20140181901A1 (en) Secure Active Networks
CN110381074B (en) Distributed attack defense method aiming at DHCP framework based on big data
CN102014115A (en) Method, device and system for anonymizing gateway node
CN107770847A (en) Method for network access, access device and terminal device
CN109660357A (en) Digital asset register method, verification method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110420