CN109492377A - Device authentication method, apparatus and electronic equipment - Google Patents

Device authentication method, apparatus and electronic equipment Download PDF

Info

Publication number
CN109492377A
CN109492377A CN201811332115.5A CN201811332115A CN109492377A CN 109492377 A CN109492377 A CN 109492377A CN 201811332115 A CN201811332115 A CN 201811332115A CN 109492377 A CN109492377 A CN 109492377A
Authority
CN
China
Prior art keywords
electronic equipment
block chain
node
facility information
checking request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811332115.5A
Other languages
Chinese (zh)
Inventor
黄德俊
唐博
康红娟
谭源泉
邓密密
袁杨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Hongwei Technology Co Ltd
Original Assignee
Sichuan Hongwei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Hongwei Technology Co Ltd filed Critical Sichuan Hongwei Technology Co Ltd
Priority to CN201811332115.5A priority Critical patent/CN109492377A/en
Publication of CN109492377A publication Critical patent/CN109492377A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

This application provides a kind of device authentication method, apparatus and electronic equipments, wherein, one device authentication method includes: the first checking request to the second electronic equipment for receiving the first electronic equipment and sending, verify whether second electronic equipment is the legitimate device registered on the block chain according to first checking request, the first verification result is obtained, first verification result is sent to first electronic equipment;Receive the second checking request to the first electronic equipment of the second electronic equipment transmission, verify whether first electronic equipment is the legitimate device registered on the block chain according to second checking request, the second verification result is obtained, second verification result is sent to second electronic equipment;If first verification result shows that second electronic equipment is legitimate device, and second verification result shows that first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.

Description

Device authentication method, apparatus and electronic equipment
Technical field
The present invention relates to block chain technical fields, set in particular to a kind of device authentication method, apparatus and electronics It is standby.
Background technique
Internet of Things connection number explosive growth, global Internet of Things connection number is about 6,000,000,000 within 2015, it is contemplated that 2025 this One number will rise to 27,000,000,000.From the point of view of the loophole of analysis industrial security, be all much in the authentication the problem of, There is also security risks for the safety of existing identity identifying method.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of device authentication method, apparatus and electronic equipment.
In a first aspect, the embodiment of the present application provides a kind of device authentication method, it is applied to block chain node, the method Include:
The first checking request to the second electronic equipment for receiving the transmission of the first electronic equipment is asked according to first verifying It asks whether verifying second electronic equipment is the legitimate device registered on the block chain, obtains the first verification result, it will First verification result is sent to first electronic equipment;
The second checking request to the first electronic equipment for receiving the transmission of the second electronic equipment is asked according to second verifying It asks whether verifying first electronic equipment is the legitimate device registered on the block chain, obtains the second verification result, it will Second verification result is sent to second electronic equipment;
If first verification result shows that second electronic equipment is legitimate device, and the second verification result table Bright first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.
Optionally, second facility information includes equipment Serial Number and the second key signature information;It is described according to institute It states the first checking request and verifies whether second electronic equipment is the packet the legitimate device registered on the block chain the step of It includes:
It inquires on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;
If it exists, then the second key signature information is matched with the facility information, judge whether can With success;
If successful match, determine that second electronic equipment is legal.
Optionally, the method also includes:
The second facility information of second electronic equipment is received, and is stored;
And second facility information is transferred to the adjacent node of the present node of the block chain, by described second Each node of the facility information in the block chain is propagated.
Optionally, the method also includes:
Judge whether second electronic equipment with third electronic equipment is in binding state;
If so, sending unbinding prompting message to the third electronic equipment.
Optionally, the method also includes:
The binding information of first electronic equipment and second electronic equipment is obtained in the block chain works as prosthomere The binding information is transferred to adjacent node by point.
Optionally, the method also includes:
The registration request that first electronic equipment is sent is received, the registration request carries user account and cipher key pair Public key;
The user account and the public key are stored;
And work as prosthomere for what the first facility information that the user account and the public key are formed was transferred to the block chain The adjacent node of point, each node of first facility information in the block chain is propagated.
Second aspect, the embodiment of the present application also provide a kind of device authentication method, which comprises
The identification code of the second electronic equipment is read, the second facility information of the second electronic equipment is obtained;
The first checking request to second electronic equipment is sent to one node of block chain, first checking request is taken The second facility information with second electronic equipment, so that the node in the block chain is to second electronic equipment It is verified;
Receive the first verification result to second electronic equipment that one node of block chain returns;
If first verification result be it is legal, by the first facility information of the first electronic equipment be sent to it is described second electricity Sub- equipment, so that second electronic equipment is sent to one node of block chain for verifying according to first facility information Second checking request of first electronic equipment.
Optionally, second facility information includes: the second device identification and the second key signature information;And/or it is described First facility information includes: the first device identification and first key signing messages.
Optionally, the method also includes:
The hot spot that second electronic equipment provides is obtained according to the identification code;
Hot spot is established with second electronic equipment by the hot spot to communicate;
If first verification result be it is legal, it is described that its first facility information is sent to second electronic equipment Step, comprising:
It is communicated by hot spot and the first facility information is sent to second electronic equipment, so that second electronic equipment The second checking request for carrying first facility information is sent to the block chain.
Optionally, the method also includes:
It is communicated by the hot spot and radio network information is sent to second electronic equipment, so that second electronics Equipment accesses wireless network.
Optionally, it is described first facility information is sent to second electronic equipment before, the method also includes:
Obtain random generation verification information;
If receive with the matched verification operation of the verification information, then execute and described be sent to its first facility information The step of second electronic equipment.
The third aspect, the present embodiment provides a kind of device authentication methods, are applied to the second electronic equipment, the method packet It includes:
Receive the first facility information of the first electronic equipment;
The second checking request to first electronic equipment is sent to one node of block chain, second checking request is taken The first facility information with first electronic equipment so that a node of the block chain to first electronic equipment into Row verifying;
Receive the second verification result to first electronic equipment that one node of block chain returns.
Optionally, it is described receive the first electronic equipment the first facility information the step of before, the method is also Include:
Identification code is generated according to the second facility information, and shows the identification code, institute can be obtained by reading the identification code State the second facility information.
Optionally, it is described receive the first electronic equipment the first facility information the step of before, the method is also Include:
The hot information provided according to the second facility information of second electronic equipment and second electronic equipment is raw At identification code, and show the identification code, second facility information can be obtained in the identification code and the hot spot is believed by reading Breath.
Fourth aspect, the embodiment of the present invention also provide a kind of device authentication device, are applied to block chain node, described device Include:
First authentication module, for receiving the first checking request to the second electronic equipment of the first electronic equipment transmission, It verifies whether second electronic equipment is the legitimate device registered on the block chain according to first checking request, obtains To the first verification result, first verification result is sent to first electronic equipment;
Second authentication module, for receiving the second checking request to the first electronic equipment of the second electronic equipment transmission, It verifies whether first electronic equipment is the legitimate device registered on the block chain according to second checking request, obtains To the second verification result, second verification result is sent to second electronic equipment;
Binding module, if showing that second electronic equipment is legitimate device for first verification result, and described Second verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronics Apparatus bound.
5th aspect, the embodiment of the present application also provide a kind of device authentication device, and described device includes:
Read module obtains the second facility information of the second electronic equipment for reading the identification code of the second electronic equipment;
First sending module, for sending the first checking request to second electronic equipment to one node of block chain, First checking request carries the second facility information of second electronic equipment, so that the node in the block chain Second electronic equipment is verified;
First result receiving module, for receiving that one node of block chain returns to second electronic equipment One verification result;
Second sending module, if for first verification result be it is legal, the first equipment of the first electronic equipment is believed Breath is sent to second electronic equipment, so that second electronic equipment is according to first facility information to the block chain One node sends the second checking request for verifying first electronic equipment.
6th aspect, the embodiment of the present application also provide a kind of device authentication device, are applied to the second electronic equipment, the dress It sets and includes:
Information receiving module, for receiving the first facility information of the first electronic equipment;
Third sending module, for sending the second checking request to first electronic equipment to one node of block chain, Second checking request carries the first facility information of first electronic equipment, so that a node pair of the block chain First electronic equipment is verified;
Second result receiving module, for receiving that one node of block chain returns to first electronic equipment Two verification results.
7th aspect, the embodiment of the present application also provide a kind of electronic equipment, comprising: processor, memory and bus, it is described Memory is stored with the executable machine readable instructions of the processor, when electronic equipment operation, the processor with it is described Any in the above method is executed by bus communication between memory, when the machine readable instructions are executed by the processor The step of method in embodiment.
Eighth aspect, the embodiment of the present application also provide a kind of computer readable storage medium, the computer-readable storage medium Computer program is stored in matter, which executes any possible in above-mentioned first aspect when being run by processor In embodiment the step of device authentication method.
Compared with prior art, the equipment of the embodiment of the present invention verification method, device and electronic equipment, by block chain On equipment is verified, since the difficulty that block chain is tampered is big, equipment is verified and can be mentioned on block chain The safety of high device authentication.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram that the node on the block chain that the embodiment of the present invention one provides is interacted with each electronic equipment.
Fig. 2 is the flow chart of device authentication method provided by Embodiment 2 of the present invention.
Fig. 3 is the flow chart for the device authentication method that the embodiment of the present invention three provides.
Fig. 4 is the flow chart for the device authentication method that the embodiment of the present invention four provides.
Fig. 5 is the flow chart for the device authentication method that the embodiment of the present invention five provides.
Fig. 6 is the functional block diagram for the apparatus that the embodiment of the present invention six provides.
Fig. 7 is the functional block diagram for the apparatus that the embodiment of the present invention seven provides.
Fig. 8 is the functional block diagram for the apparatus that the embodiment of the present invention eight provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Internet of Things use it is universal keep user also just more convenient to the operations of various household appliances, although convenient Bring some drawbacks.For example, there may be some security risks for household appliance.Therefore, existing to be set there are some to household electrical appliances It is standby to implement to verify household appliance before control to improve the safety of household appliance.But existing authentication Formula may or can have security risk, e.g., household appliance use MAC Address, equipment Serial Number as authentication mark Identification, these attributes are all the intrinsic some attributes of household appliance, there is the possibility enumerated, once exposure, then may just not have Method reparation;For another example many terminal devices use same password storage in code, once terminal, by decompiling, password is let out Leakage, household appliance also have no idea to repair, provide product side and also have no idea to remedy.
It can be realized multi-party verification by following multiple embodiments based on above-mentioned consideration the application, improve making for household appliance With safety, it is described in detail below.
Embodiment one
As shown in Figure 1, being the running environment schematic diagram of device authentication method provided in an embodiment of the present invention.In the present embodiment Device authentication method locating for may include: the node 100 of block chain in environment, communicate with each node in block chain First electronic equipment 200 and the second electronic equipment 300 communicated with each node in block chain.It is each in block chain Node 100 can be communicated by network with the first electronic equipment 200 and the second electronic equipment 300, to carry out data interaction.Block Each node in chain establishes connection with P2P (Peer to Peer) peer-to-peer network.Node 100 in block chain can be network Server, database server, PC etc..The first above-mentioned electronic equipment 200 can be PC (personal Computer, PC), tablet computer, smart phone, personal digital assistant (personal digital assistant, PDA) Deng.The second above-mentioned electronic equipment 300 can be household electrical appliance, intelligentized Furniture etc..
Block chain is the decentralization distributed data base system for participating in maintenance jointly by nodes all in block chain.Block Chain technology is to verify to know together algorithm with storing data, using distributed node to generate and update using block linked data structure Data, utilize the intelligence being made of automatized script code at the safety for guaranteeing data transmission and access in the way of cryptography Contract programs the completely new distributed basis framework and calculation of one kind with operation data.
Each new node that block chain is added can synchronize all data on current block chain, so that in block chain Each node can preserve all data on block chain.
When each node has more new data, which propagates more new data other nodes in block chain, so that area Each node in block chain preserves the more new data.
In the present embodiment, any node in block chain can receive the registration request of the first electronic equipment.The registration is asked It asks including user account and public key.Wherein, the first electronic equipment key pair, the key pair include public key and private key.Key pair Public key is uploaded to a node in block chain.The private key of key pair is stored in the first electronic equipment, forms user account and electronics The binding relationship of equipment.
In the present embodiment, any node in block chain can receive the second facility information of the second electronic equipment, wherein Second facility information may include equipment Serial Number, public key certificate and process private key signature corresponding with above-mentioned public key certificate Sequence number.
Embodiment two
The present embodiment provides a kind of device authentication method, which is applied to management equipment safety, provides and sets Any node in the block chain network of standby authentication server, when needing to carry out device authentication using the node, in the node It can store the second facility information of correlation of legitimate device.Specifically, referring to Fig. 2, being provided in an embodiment of the present invention set The flow chart of standby verification method.Detailed process shown in Fig. 2 will be described in detail below.
Step S401 receives the first checking request to the second electronic equipment that the first electronic equipment is sent, according to described First checking request verifies whether second electronic equipment is the legitimate device registered on the block chain, obtains first and tests Card is as a result, be sent to first electronic equipment for first verification result.
First checking request carries the second facility information of second electronic equipment.
Wherein, the first checking request can carry the second facility information of the second electronic equipment still to be tested.
It also needs to store the second facility information of the second electronic equipment before executing step S401.Therefore, make Further to consider, device authentication method can also include: the second facility information for receiving second electronic equipment, go forward side by side Row storage;And second facility information is transferred to the adjacent node of the present node of the block chain, by described second Each node of the facility information in the block chain is propagated.
Specifically, before step S401, the second facility information that the node in block chain receives for the first time can be by What the second electronic equipment was sent, it is also possible to be known by the equipment identities of unified multiple second electronic equipments sent of a management terminal Other code.
In an example, the second electronic equipment can be TV, and TV, can be according to manufacturer couple after completing The sequence number create-rule answered is each tv distribution equipment sequence number, public key certificate, and according to the corresponding private of the public key certificate Key is the equipment sequence signatures generated.And TV deposits public key certificate, equipment Serial Number and sequence number Jing Guo private key signature Storage is in the television.Further, it is saved in any node which is also further sent in block chain.
In one embodiment, second facility information includes equipment Serial Number;In the present embodiment according to It may include: to look into that whether it is the legitimate device registered on the block chain that the first checking request verifies second electronic equipment It askes on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;If it exists, then determine second electronics Equipment is legal.
In another embodiment, second facility information includes equipment Serial Number and the second key signature letter Breath;Above-mentioned verifies whether second electronic equipment is the conjunction registered on the block chain according to first checking request Method equipment includes: on the inquiry block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;If it exists, then by institute It states the second key signature information to be matched with the facility information, judging whether being capable of successful match;If successful match is sentenced Fixed second electronic equipment is legal.By further to equipment Serial Number to using private key to sign, by signature Information is further verified, and uses MAC Address, equipment Serial Number using intelligent appliance equipment if can avoid or reduce When mark as authentication is other, these attributes are all the intrinsic some attributes of equipment, there is the possibility enumerated, once cruelly Dew, the drawbacks of just having no idea to repair.
The first above-mentioned signing messages can be using the corresponding private key of the public key certificate stored in TV to equipment sequence Number signing messages signed.
Further, in this embodiment the block chain used can be alliance's chain.Alliance's chain is just for some specific group Member and limited third party, inside specifies the nodes of multiple pre-selections for book keeping operation people, and each piece of generation is by all pre-selections Node codetermines, other access nodes can participate in business, but keep aloof from accounting procedure, other third parties can pass through the area The open API (Application Programming Interface, application programming interface) of block chain is defined and looks into It askes.
Step S402 receives the second checking request to the first electronic equipment that the second electronic equipment is sent, according to described Second checking request verifies whether first electronic equipment is the legitimate device registered on the block chain, obtains second and tests Card is as a result, be sent to second electronic equipment for second verification result.
Second checking request carries the first facility information of first electronic equipment.
In one embodiment, first facility information includes user account;Above-mentioned verifies according to described second It includes: the inquiry block chain that whether the first electronic equipment described in requests verification, which is the legitimate device registered on the block chain, It is upper to whether there is the corresponding user information of the user account;If it exists, then determine that first electronic equipment is legal.
In another embodiment, first facility information includes user account and the second key signature information, on That states verifies whether first electronic equipment is that register on the block chain legal sets according to second checking request Standby includes: on the inquiry block chain with the presence or absence of the corresponding user information of the user account;If it exists, then by described second Key signature information is matched with the user information, and judging whether being capable of successful match;If so, determining first electronics Equipment is legal.
Step S403, if it is legitimate device that first verification result, which shows second electronic equipment, and described second Verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronic equipment Binding.
Method in the present embodiment can be applied to any node in block chain, the node and the first electronic equipment and second Electronic equipment communication connection, after the first electronic equipment and the second electronic equipment realize binding, the first electronic equipment is for control the Two electronic equipments execute setting operation.
In an example, the second electronic equipment can be TV, and the first electronic equipment can be mobile phone, tablet computer etc. Mobile device.By the operation of the key of the setting on mobile phone, the control to TV may be implemented.Control may include open with It closes, sound is tuned up or turned down, program is adjusted, TV shows adjusting of picture etc..
In the bi-directional verification of step S401 and step S402, i.e. the second electronic equipment submits the verifying to the first electronic equipment On the basis of request and the first electronic equipment are submitted to the checking request of the second electronic equipment, two-way tie up can be further realized It is fixed, it can better ensure that the first electronic equipment of both sides and the bidirectional safe of the second electronic equipment.In the first electronic equipment and After second electronic equipment submits checking request, then the two-way binding of the first electronic equipment and the second electronic equipment is fully achieved, To allow the first electronic equipment to operate the second electronic equipment.The above-mentioned step S403 of device authentication method can wrap Include pre-binding and whole grade binding.Therefore, on the basis of the above, device authentication method can also include:
Step a, if first verification result be characterized as it is legal, by first electronic equipment and second electronics Equipment carries out pre-binding.
Step b, if second verification result be it is legal, judge that first electronic equipment is set with second electronics It is standby whether to have carried out pre-binding;If so, first electronic equipment and second electronic equipment are realized binding.
Wherein, in block chain before receiving the first checking request to the second electronic equipment that the first electronic equipment is sent In second electronic equipment is recorded, then it represents that second electronic equipment is legal.
In one embodiment, the binding of the first electronic equipment and the second electronic equipment can be the binding between equipment It can be and bind the device identification number of the second electronic equipment and the first electronic equipment.
In another embodiment, the binding of the first electronic equipment and the second electronic equipment can be tying up between equipment Surely it can be the binding using account of the middle login of the second electronic equipment and the first electronic equipment.It can be using account The application program of network service for obtaining the offer of block chain is installed, application program applies account by one in one electronic equipment Number obtain block chain in each node provide service.
There are also in a kind of embodiment, the binding of the first electronic equipment and the second electronic equipment can be tying up between equipment Surely it can be the communications account binding in the second electronic equipment and the first electronic equipment.
If the second electronic equipment and third electronic equipment there are binding relationship, can inform third electronic equipment about The message of the binding relationship of first electronic equipment and the second electronic equipment.
Further, device authentication method further include: judge second electronic equipment whether at third electronic equipment In binding state;If so, sending unbinding prompting message to the third electronic equipment.
In one embodiment, it can be and unbinding prompting message is sent to third electronics in a manner of short message sets Standby associated communications account.
In another embodiment, third electronic equipment can be equipped with the network service for obtaining the offer of block chain Application program, login in the application program that above-mentioned contact binding prompting message can be sent in the third electronic equipment Using in account, and shown by the application program.
If there are binding relationships for the second electronic equipment and third electronic equipment, it can send and test to third electronic equipment Message is demonstrate,proved, is bound after being verified, then to the first electronic equipment and the second electronic equipment.
Further, device authentication method further include: judge second electronic equipment whether at third electronic equipment In binding state;If so, sending verifying message to the third electronic equipment;After receiving the verifying message, implementation pair The binding of first electronic equipment and the second electronic equipment acts.
Wherein, the node in block chain receives verifying message can be to be sent by third electronic equipment, can also Being sent by the first electronic equipment.
Be thought of as further improving the second electronic equipment of verifying safety can on the basis of Fig. 2 further, First electronic equipment is also verified, to realize bi-directional verification, improves the reliability of device authentication.
In some embodiments, device authentication method further include: obtained in the block chain first electronic equipment and The binding information is transferred to adjacent node by the present node of the binding information of second electronic equipment.
In further embodiments, device authentication method further include: first electronic equipment is obtained in the block chain The binding information is transferred to associated node with the present node of the binding information of second electronic equipment.
One application program can be installed, which can be used for obtaining each in block chain in the first electronic equipment The network service that a node provides.Therefore, any node into block chain registration can be sent in advance in the first electronic equipment Request.
In one embodiment, device authentication method can also include: to receive first electricity before step S401 The registration request that sub- equipment is sent, the registration request carry the public key of user account and cipher key pair;By the user account And the public key is stored;And the first facility information that the user account and the public key are formed is transferred to the block The adjacent node of the present node of chain propagates each node of second facility information in the block chain.
In another embodiment, device authentication method can also include: before step S401
The registration request that first electronic equipment is sent is received, the registration request carries the public key of cipher key pair;
The public key is stored, and generates user account at random or according to setting rule;
The user account of generation is sent to the first electronic equipment, and receives first electronic equipment according to above-mentioned public key Corresponding private key is the user account after user account signature;
And work as prosthomere for what the first facility information that the user account and the public key are formed was transferred to the block chain The adjacent node of point, each node of second facility information in the block chain is propagated.
By the way that user account is signed using private key, the first electronic equipment access block chain can be preferably determined The safety of the access process of any node avoids the node in some underproof electronic equipment access block chains, improves equipment The safety of verifying.
Embodiment three
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two Partially similar, the method in embodiment two is executed by the node in block chain, and the method in the present embodiment is set by the first electronics It is standby to execute.Close in this present embodiment with overlaps will not be repeated in embodiment two.As shown in figure 3, setting in the present embodiment Standby verification method includes the following steps.
Step S501 reads the identification code of the second electronic equipment, obtains the second facility information of the second electronic equipment.
In one embodiment, the second electronic equipment after powering, shows an identification code, identification in display interface Code includes the second facility information.Second facility information includes equipment Serial Number, public key certificate and the sequence number Jing Guo private key signature. Above-mentioned identification code can be two dimensional code, bar code, character string etc..
In another embodiment, the identification code of entity can be posted on the second electronic equipment.
It is described so that identification code is two dimensional code as an example below.
First electronic equipment starts identification code scanning function and reads two dimensional code, to obtain the second equipment letter of two dimensional code carrying Breath.
In an example, the first electronic equipment can read two dimension by the scanning function in third party application Code, third party application can be the application program that wechat, QQ etc. have " sweep and sweep " function.
In another example, the network service for obtaining the offer of block chain can be installed in the first electronic equipment Application program can have the function of scanning the two-dimensional code in the application program.
Step S502 sends the first checking request to second electronic equipment to one node of block chain.
First checking request carries the second facility information of second electronic equipment, so that one in the block chain Node verifies second electronic equipment.
Step S503 receives the first verification result to second electronic equipment that one node of block chain returns.
Step S504, if first verification result be it is legal, the first facility information of first electronic equipment is sent out Second electronic equipment is given, so that second electronic equipment is according to first facility information to one section of block chain Point sends the second checking request for verifying first electronic equipment.
Further, in order to enable the first electronic equipment to be in communication with each other with the second electronic equipment, data are transmitted.Therefore, Second electronic equipment opens a hot spot on startup, and the identification code of the second above-mentioned electronic equipment can also carry the second electricity The username and password of the hot spot of sub- opening of device;First electronic equipment can according to the username and password of the hot spot realize with Second electronic equipment establishes connection.By starting a hot spot on the second electronic equipment, can the second electronic equipment not into In the case where row network connection, the mutual data transmission with the first electronic equipment also can be realized, reduce user to the second electricity The operation of sub- equipment.
Specifically, device authentication method further include: the heat that second electronic equipment provides is obtained according to the identification code Point;It is established and is communicated to connect by the hot spot and second electronic equipment;If first verification result be it is legal, by the One facility information is sent to second electronic equipment, so that second electronic equipment is sent described in carrying to the block chain Second checking request of the first facility information.
Further, radio network information can also be sent to the second electronic equipment, the second electronics by the first electronic equipment Equipment accesses wireless network according to the radio network information.
Second electronic equipment then can by the wireless network of access access block chain in node, so as to realize to Node on block chain sends the checking request of the verifying to the first electronic equipment.
In order to further make the safety of the communication before the first electronic equipment and the second electronic equipment, can also pass Identifying code is generated before transmission of data to verify the user of operation.
It is described first facility information is sent to second electronic equipment before, the method also includes: obtain with Machine generates verification information;If receive with the matched verification operation of the verification information, then execute step for the first facility information It is sent to second electronic equipment.
After obtaining random generation verification information, it may be displayed on the first electronic equipment, also may be displayed on the second electronics In equipment.
In an example, verification information can be character string, can wrap with the matched verification operation of the verification information Include input character string identical with the character string.In another example, verification information can be gesture figure, believe with the verifying Ceasing matched verification operation may include detecting to form slide corresponding with gesture figure in touch interface.There are one real In example, verification information can be multiple images and select the specified image in image, grasp with the matched verifying of the verification information Work may include the selection operation received to specified image.
Further, if one node of block chain is bound the first electronic equipment and the second electronic equipment, first Electronic equipment can also receive the notice of the binding result of one node of block chain transmission.
Example IV
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two Partially similar, the method in embodiment two is executed by the node in block chain, and the method in the present embodiment is set by the second electronics It is standby to execute.Close in this present embodiment with overlaps will not be repeated in embodiment two.As shown in figure 4, setting in the present embodiment Standby verification method includes the following steps.
Step S601 receives the first facility information of the first electronic equipment.
In one embodiment, before step S601, device authentication method further include: raw according to the second facility information It at identification code, and shows the identification code, second facility information can be obtained by reading the identification code.
In another embodiment, it before step S601, is posted on the second electronic equipment according to the second facility information The identification code of generation.
First facility information includes user account, public key certificate and user account and public key certificate Jing Guo private key signature, SSID, password, chain address and port etc..
Step S602 sends the second checking request to first electronic equipment to one node of block chain.
The second above-mentioned checking request carries the first facility information of first electronic equipment, so that the block chain A node first electronic equipment is verified.
Step S603 receives the second verification result to first electronic equipment that one node of block chain returns.
Further, if one node of block chain is bound the first electronic equipment and the second electronic equipment, second Electronic equipment can also receive the notice of the binding result of one node of block chain transmission.
It can also include receiving the radio network information that the first electronic equipment is sent to be sent to second before step S601 Electronic equipment, the second electronic equipment access wireless network according to the radio network information.It is sent by using the first electronic equipment Node of the radio network information into block chain carry out wireless communication, it is possible to reduce the second electronic equipment is needed through other sides The operation of formula access network, it is possible to reduce setting of the user to the second electronic equipment improves verification efficiency.
Embodiment five
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two Partially similar, method in embodiment two is executed by the node in block chain, the method in the present embodiment by include block chain, The system of first electronic equipment and the second electronic equipment executes.Close in this present embodiment in place of repetition in embodiment two no longer It repeats.As shown in figure 5, the device authentication method in the present embodiment includes the following steps.With the first electronic equipment in the present embodiment It is mobile device, the second electronic equipment is described for smart machine.
Public key in the secret key pair of generation is sent to one node of block chain by step S701, mobile device, realizes registration.
Its second facility information is sent to one node of block chain by step S702, smart machine.
Step S703, mobile device scan the identification code of smart machine, obtain the second facility information of smart machine.
Step S704, mobile device send the first checking request to smart machine to one node of block chain.
First checking request carries the second facility information of second electronic equipment, so that one in the block chain Node verifies second electronic equipment.
Step S705, one node of block chain verify smart machine according to the second facility information of preservation.
Step S706, if verifying is legal, mobile device and smart machine are carried out pre-binding by one node of block chain.
Step S707, mobile device are established with smart machine and are led to by identifying that identification code obtains the hot spot of smart machine Letter connection.
Its first facility information is sent to smart machine by step S708, mobile device.
Step S709, smart machine think that one node of block chain sends the second checking request.
Second checking request carries the first above-mentioned facility information.
Step S710, one node of block chain verify mobile device according to the first facility information of preservation.
Step S711, if verifying is legal, mobile device and smart machine are carried out ultimate binding by one node of block chain.
Other details about the present embodiment can refer to description of the above embodiments two into example IV, herein not It repeats again.
The safety that the second electronic equipment can be improved by a complete bi-directional verification, also can be improved the first electronics The legitimacy of the operation of equipment, so as to the first electronic equipment to the reliability of the operation of the second electronic equipment.
Embodiment six
Conceived based on same application, the device authentication method pair provided with embodiment two is be provided in the embodiment of the present application The device authentication device answered, the principle and the above-mentioned implementation of the embodiment of the present application solved the problems, such as due to the device in the embodiment of the present application Device authentication method in example two is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 6, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested Card device includes: the first authentication module 801, the second authentication module 802 and binding module 803;Wherein
First authentication module 801, for receiving asking to the first verifying of the second electronic equipment for the first electronic equipment transmission It asks, verifies whether second electronic equipment is that register on the block chain legal sets according to first checking request It is standby, the first verification result is obtained, first verification result is sent to first electronic equipment.
First checking request carries the second facility information of second electronic equipment.
Second authentication module 802, for receiving asking to the second verifying of the first electronic equipment for the second electronic equipment transmission It asks, verifies whether first electronic equipment is that register on the block chain legal sets according to second checking request It is standby, the second verification result is obtained, second verification result is sent to second electronic equipment.
Second checking request carries the first facility information of first electronic equipment.
Binding module 803, if showing that second electronic equipment is legitimate device, and institute for first verification result It states the second verification result and shows that first electronic equipment is legitimate device, then by first electronic equipment and second electricity Sub- apparatus bound.
Device authentication device in the embodiment of the present application, is applied to block chain node, the node and the first electronic equipment and After the communication connection of second electronic equipment, first electronic equipment and second electronic equipment realize binding, first electricity Sub- equipment executes setting operation for controlling second electronic equipment.
Further, in this embodiment device can be also used for execute embodiment two in other steps, about this reality The other details for applying example can also further in reference implementation example two description, will no longer repeat one by one in the present embodiment.
Embodiment seven
Conceived based on same application, the device authentication method pair provided with embodiment three is be provided in the embodiment of the present application The device authentication device answered, the principle solved the problems, such as due to the device in the embodiment of the present application and the embodiment of the present application above equipment Verification method is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 7, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested Card device: read module 901, the first sending module 902, the first result receiving module 903 and the second sending module 904;Its In:
Read module 901 obtains the second equipment letter of the second electronic equipment for reading the identification code of the second electronic equipment Breath;
First sending module 902 asks the first verifying of second electronic equipment for sending to one node of block chain It asks, first checking request carries the second facility information of second electronic equipment, so that one in the block chain Node verifies second electronic equipment;
First result receiving module 903, for receiving that one node of block chain returns to second electronic equipment The first verification result;
Second sending module 904, if for first verification result be it is legal, by the first of first electronic equipment Facility information is sent to second electronic equipment, so that second electronic equipment is according to first facility information to described One node of block chain sends the second checking request for verifying first electronic equipment.
Further, in this embodiment device can be also used for execute embodiment three in other steps, about this reality The other details for applying example can also further in reference implementation example three description, will no longer repeat one by one in the present embodiment.
Embodiment eight
Conceived based on same application, the device authentication method pair provided with example IV is be provided in the embodiment of the present application The device authentication device answered, the principle solved the problems, such as due to the device in the embodiment of the present application and the embodiment of the present application above equipment Verification method is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 8, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested Card device includes: information receiving module 1001, third sending module 1002 and the second result receiving module 1003;Wherein:
Information receiving module 1001, for receiving the first facility information of the first electronic equipment;
Third sending module 1002 asks the second verifying of first electronic equipment for sending to one node of block chain It asks, second checking request carries the first facility information of first electronic equipment, so that a section of the block chain Point verifies first electronic equipment;
Second result receiving module 1003, for receiving that one node of block chain returns to first electronic equipment The second verification result.
Further, in this embodiment device can be also used for execute example IV in other steps, about this reality The other details for applying example can also further in reference implementation example four description, will no longer repeat one by one in the present embodiment.
The equipment of the embodiment of the present invention verification method, device and electronic equipment, by testing on block chain equipment Card, since the difficulty that block chain is tampered is big, carrying out verifying to equipment on block chain can be improved the peace of device authentication Quan Xing.In addition, being verified by the first electronic equipment to the second electronic equipment, the second electronic equipment is also to the first electronic equipment It is verified, effective bi-directional verification may be implemented, improve the safety that equipment uses.Further, pass through the application of block chain The information that cloud can be effectively prevented is tampered, and can also further improve the validity of verifying.
In addition, the embodiment of the present application also provides a kind of computer readable storage medium, on the computer readable storage medium It is stored with computer program, device authentication described in above method embodiment is executed when which is run by processor The step of method.
The computer program product of device authentication method provided by the embodiment of the present application, including storing program code Computer readable storage medium, the instruction that said program code includes can be used for executing equipment described in above method embodiment The step of verification method, for details, reference can be made to above method embodiments, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device. In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (19)

1. a kind of device authentication method, which is characterized in that be applied to block chain node, which comprises
The first checking request to the second electronic equipment for receiving the transmission of the first electronic equipment, is tested according to first checking request Demonstrate,prove whether second electronic equipment is the legitimate device registered on the block chain, obtains the first verification result, it will be described First verification result is sent to first electronic equipment,
The second checking request to the first electronic equipment for receiving the transmission of the second electronic equipment, is tested according to second checking request Demonstrate,prove whether first electronic equipment is the legitimate device registered on the block chain, obtains the second verification result, it will be described Second verification result is sent to second electronic equipment;
If first verification result shows that second electronic equipment is legitimate device, and second verification result shows institute Stating the first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.
2. the method as described in claim 1, which is characterized in that first checking request carries second electronic equipment The second facility information;Second facility information includes equipment Serial Number and the second key signature information;It is described according to institute It states the first checking request and verifies whether second electronic equipment is the packet the legitimate device registered on the block chain the step of It includes:
It inquires on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;
If it exists, then the second key signature information is matched with the facility information, judges whether to match into Function;
If successful match, determine that second electronic equipment is legal.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
The second facility information of second electronic equipment is received, and is stored;
And second facility information is transferred to the adjacent node of the present node of the block chain, by second equipment Each node of the information in the block chain is propagated.
4. the method as described in claim 1, which is characterized in that the method also includes:
Judge whether second electronic equipment with third electronic equipment is in binding state;
If so, sending unbinding prompting message to the third electronic equipment.
5. the method as described in claim 1, which is characterized in that the method also includes:
The present node that the binding information of first electronic equipment and second electronic equipment is obtained in the block chain will The binding information is transferred to adjacent node.
6. the method as described in claim 1, which is characterized in that the method also includes:
The registration request that first electronic equipment is sent is received, the registration request carries the public affairs of user account and cipher key pair Key;
The user account and the public key are stored;
And the first facility information that the user account and the public key are formed is transferred to the present node of the block chain Adjacent node propagates each node of first facility information in the block chain.
7. a kind of device authentication method, which is characterized in that be applied to the first electronic equipment, which comprises
The identification code of the second electronic equipment is read, the second facility information of the second electronic equipment is obtained;
The first checking request to second electronic equipment is sent to one node of block chain, first checking request carries Second facility information of second electronic equipment, so that the node in the block chain carries out second electronic equipment Verifying;
Receive the first verification result to second electronic equipment that one node of block chain returns;
If first verification result be it is legal, by the first facility information of first electronic equipment be sent to it is described second electricity Sub- equipment, so that second electronic equipment is sent to one node of block chain for verifying according to first facility information Second checking request of first electronic equipment.
8. the method for claim 7, which is characterized in that second facility information includes: the second device identification and the Two key signature information;And/or first facility information includes: the first device identification and first key signing messages.
9. the method for claim 7, which is characterized in that the method also includes:
The hot spot that second electronic equipment provides is obtained according to the identification code;
Hot spot is established with second electronic equipment by the hot spot to communicate;
If first verification result be it is legal, first facility information by first electronic equipment is sent to described the The step of two electronic equipments, comprising:
It is communicated by hot spot and the first facility information is sent to second electronic equipment, so that second electronic equipment is to institute It states block chain and sends the second checking request for carrying first facility information.
10. method as claimed in claim 9, which is characterized in that the method also includes:
It is communicated by the hot spot and radio network information is sent to second electronic equipment, so that second electronic equipment Access wireless network.
11. the method for claim 7, which is characterized in that believe in first equipment by first electronic equipment Breath is sent to before second electronic equipment, the method also includes:
Obtain random generation verification information;
If receive with the matched verification operation of the verification information, then execute first by first electronic equipment and set The step of standby information is sent to second electronic equipment.
12. a kind of device authentication method, which is characterized in that be applied to the second electronic equipment, which comprises
Receive the first facility information of the first electronic equipment;
The second checking request to first electronic equipment is sent to one node of block chain, second checking request carries First facility information of first electronic equipment a, so that node of the block chain tests first electronic equipment Card;
Receive the second verification result to first electronic equipment that one node of block chain returns.
13. method as claimed in claim 12, which is characterized in that in first equipment for receiving the first electronic equipment Before the step of information, the method also includes:
Identification code is generated according to the second facility information, and shows the identification code, can be obtained described the by reading the identification code Two facility informations.
14. method as claimed in claim 12, which is characterized in that in first equipment for receiving the first electronic equipment Before the step of information, the method also includes:
It is generated and is known according to the hot information that the second facility information of second electronic equipment and second electronic equipment provide Other code, and show the identification code, second facility information and the hot information can be obtained by reading the identification code.
15. a kind of device authentication device, which is characterized in that be applied to block chain node, described device includes:
First authentication module, for receiving the first checking request to the second electronic equipment of the first electronic equipment transmission, according to First checking request verifies whether second electronic equipment is the legitimate device registered on the block chain, obtains First verification result is sent to first electronic equipment by one verification result;
Second authentication module, for receiving the second checking request to the first electronic equipment of the second electronic equipment transmission, according to Second checking request verifies whether first electronic equipment is the legitimate device registered on the block chain, obtains Second verification result is sent to second electronic equipment by two verification results;
Binding module, if showing that second electronic equipment is legitimate device for first verification result, and described second Verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronic equipment Binding.
16. a kind of device authentication device, which is characterized in that be applied to the first electronic equipment, described device includes:
Read module obtains the second facility information of the second electronic equipment for reading the identification code of the second electronic equipment;
First sending module, it is described for sending the first checking request to second electronic equipment to one node of block chain First checking request carries the second facility information of second electronic equipment, so that the node in the block chain is to institute The second electronic equipment is stated to be verified;
First result receiving module, for receiving testing the first of second electronic equipment for one node of the block chain return Demonstrate,prove result;
Second sending module, if for first verification result be it is legal, the first equipment of first electronic equipment is believed Breath is sent to second electronic equipment, so that second electronic equipment is according to first facility information to the block chain One node sends the second checking request for verifying first electronic equipment.
17. a kind of device authentication device, which is characterized in that be applied to the second electronic equipment, described device includes:
Information receiving module, for receiving the first facility information of the first electronic equipment;
Third sending module, it is described for sending the second checking request to first electronic equipment to one node of block chain Second checking request carries the first facility information of first electronic equipment, so that a node of the block chain is to described First electronic equipment is verified;
Second result receiving module, for receiving testing the second of first electronic equipment for one node of the block chain return Demonstrate,prove result.
18. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with described The executable machine readable instructions of processor, when electronic equipment operation, by total between the processor and the memory Line communication, execution is such as the method as described in claim 1 to 14 is any when the machine readable instructions are executed by the processor Step.
19. a kind of computer readable storage medium, which is characterized in that be stored with computer journey on the computer readable storage medium Sequence, the step of method as described in claim 1 to 14 is any is executed when which is run by processor.
CN201811332115.5A 2018-11-09 2018-11-09 Device authentication method, apparatus and electronic equipment Pending CN109492377A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811332115.5A CN109492377A (en) 2018-11-09 2018-11-09 Device authentication method, apparatus and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811332115.5A CN109492377A (en) 2018-11-09 2018-11-09 Device authentication method, apparatus and electronic equipment

Publications (1)

Publication Number Publication Date
CN109492377A true CN109492377A (en) 2019-03-19

Family

ID=65695539

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811332115.5A Pending CN109492377A (en) 2018-11-09 2018-11-09 Device authentication method, apparatus and electronic equipment

Country Status (1)

Country Link
CN (1) CN109492377A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166460A (en) * 2019-05-24 2019-08-23 北京思源互联科技有限公司 Register method and device, storage medium, the electronic device of service account
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN115102795A (en) * 2022-08-26 2022-09-23 北京盈泽世纪科技发展有限公司 Communication security verification method and system
CN115150109A (en) * 2021-03-29 2022-10-04 中移(上海)信息通信科技有限公司 Authentication method, device and related equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103441989A (en) * 2013-08-05 2013-12-11 大唐移动通信设备有限公司 Authentication and information processing method and device
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据***有限公司 Two-way safety verification method and system based on portable device
CN106101147A (en) * 2016-08-12 2016-11-09 北京同余科技有限公司 A kind of method and system realizing smart machine and remote terminal dynamic encryption communication
CN107592293A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN108769186A (en) * 2018-05-28 2018-11-06 中国联合网络通信集团有限公司 service authority control method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103441989A (en) * 2013-08-05 2013-12-11 大唐移动通信设备有限公司 Authentication and information processing method and device
CN103716794A (en) * 2013-12-25 2014-04-09 北京握奇数据***有限公司 Two-way safety verification method and system based on portable device
CN106101147A (en) * 2016-08-12 2016-11-09 北京同余科技有限公司 A kind of method and system realizing smart machine and remote terminal dynamic encryption communication
CN107592293A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN108769186A (en) * 2018-05-28 2018-11-06 中国联合网络通信集团有限公司 service authority control method and device

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166460A (en) * 2019-05-24 2019-08-23 北京思源互联科技有限公司 Register method and device, storage medium, the electronic device of service account
CN110166460B (en) * 2019-05-24 2021-12-14 北京思源理想控股集团有限公司 Service account registration method and device, storage medium and electronic device
CN110599653A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN110599653B (en) * 2019-09-11 2022-02-11 腾讯科技(深圳)有限公司 Access control unlocking method, device and storage medium
CN111050326A (en) * 2019-11-28 2020-04-21 泰康保险集团股份有限公司 Short message verification method, device, equipment and medium based on block chain
CN111050326B (en) * 2019-11-28 2023-08-25 泰康保险集团股份有限公司 Block chain-based short message verification method, device, equipment and medium
CN115150109A (en) * 2021-03-29 2022-10-04 中移(上海)信息通信科技有限公司 Authentication method, device and related equipment
CN115102795A (en) * 2022-08-26 2022-09-23 北京盈泽世纪科技发展有限公司 Communication security verification method and system

Similar Documents

Publication Publication Date Title
CN109492377A (en) Device authentication method, apparatus and electronic equipment
CN109756485B (en) Electronic contract signing method, electronic contract signing device, computer equipment and storage medium
CN107508796B (en) A kind of data communications method and device
CN102577230B (en) Low-latency peer session establishment
Nosouhi et al. Blockchain for secure location verification
EP1610202A1 (en) Using a portable security token to facilitate public key certification for devices in a network
CN105453099B (en) For showing the information processing equipment, information processing method and the computer program that correspond to the information of encryption key
CN105635062B (en) The verification method and device of network access equipment
CN105099707B (en) A kind of offline authentication method, server and system
Gambs et al. Prover anonymous and deniable distance-bounding authentication
CN108900507A (en) Block chain real name identification method and system
CN106230784A (en) A kind of device authentication method and device
JP2008312048A (en) Authentication method of information terminal
Sethi et al. Misbinding attacks on secure device pairing and bootstrapping
CN109981287A (en) A kind of code signature method and its storage medium
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
Lee et al. A user-friendly authentication solution using NFC card emulation on android
Hajny et al. Attribute‐based credentials with cryptographic collusion prevention
Li et al. An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks
Armknecht et al. On RFID privacy with mutual authentication and tag corruption
Frederiksen A holistic approach to enhanced security and privacy in digital health passports
Payeras-Capellà et al. Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes
GH et al. A security approach to build a trustworthy ubiquitous learning system
Golaszewski et al. Project-based learning continues to inspire cybersecurity students: the 2018--2019 SFS research studies at UMBC
Alshehri et al. Formally defining NFC M-coupon requirements, with a case study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319

RJ01 Rejection of invention patent application after publication