CN109492377A - Device authentication method, apparatus and electronic equipment - Google Patents
Device authentication method, apparatus and electronic equipment Download PDFInfo
- Publication number
- CN109492377A CN109492377A CN201811332115.5A CN201811332115A CN109492377A CN 109492377 A CN109492377 A CN 109492377A CN 201811332115 A CN201811332115 A CN 201811332115A CN 109492377 A CN109492377 A CN 109492377A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- block chain
- node
- facility information
- checking request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Telephonic Communication Services (AREA)
Abstract
This application provides a kind of device authentication method, apparatus and electronic equipments, wherein, one device authentication method includes: the first checking request to the second electronic equipment for receiving the first electronic equipment and sending, verify whether second electronic equipment is the legitimate device registered on the block chain according to first checking request, the first verification result is obtained, first verification result is sent to first electronic equipment;Receive the second checking request to the first electronic equipment of the second electronic equipment transmission, verify whether first electronic equipment is the legitimate device registered on the block chain according to second checking request, the second verification result is obtained, second verification result is sent to second electronic equipment;If first verification result shows that second electronic equipment is legitimate device, and second verification result shows that first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.
Description
Technical field
The present invention relates to block chain technical fields, set in particular to a kind of device authentication method, apparatus and electronics
It is standby.
Background technique
Internet of Things connection number explosive growth, global Internet of Things connection number is about 6,000,000,000 within 2015, it is contemplated that 2025 this
One number will rise to 27,000,000,000.From the point of view of the loophole of analysis industrial security, be all much in the authentication the problem of,
There is also security risks for the safety of existing identity identifying method.
Summary of the invention
In view of this, the embodiment of the present invention is designed to provide a kind of device authentication method, apparatus and electronic equipment.
In a first aspect, the embodiment of the present application provides a kind of device authentication method, it is applied to block chain node, the method
Include:
The first checking request to the second electronic equipment for receiving the transmission of the first electronic equipment is asked according to first verifying
It asks whether verifying second electronic equipment is the legitimate device registered on the block chain, obtains the first verification result, it will
First verification result is sent to first electronic equipment;
The second checking request to the first electronic equipment for receiving the transmission of the second electronic equipment is asked according to second verifying
It asks whether verifying first electronic equipment is the legitimate device registered on the block chain, obtains the second verification result, it will
Second verification result is sent to second electronic equipment;
If first verification result shows that second electronic equipment is legitimate device, and the second verification result table
Bright first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.
Optionally, second facility information includes equipment Serial Number and the second key signature information;It is described according to institute
It states the first checking request and verifies whether second electronic equipment is the packet the legitimate device registered on the block chain the step of
It includes:
It inquires on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;
If it exists, then the second key signature information is matched with the facility information, judge whether can
With success;
If successful match, determine that second electronic equipment is legal.
Optionally, the method also includes:
The second facility information of second electronic equipment is received, and is stored;
And second facility information is transferred to the adjacent node of the present node of the block chain, by described second
Each node of the facility information in the block chain is propagated.
Optionally, the method also includes:
Judge whether second electronic equipment with third electronic equipment is in binding state;
If so, sending unbinding prompting message to the third electronic equipment.
Optionally, the method also includes:
The binding information of first electronic equipment and second electronic equipment is obtained in the block chain works as prosthomere
The binding information is transferred to adjacent node by point.
Optionally, the method also includes:
The registration request that first electronic equipment is sent is received, the registration request carries user account and cipher key pair
Public key;
The user account and the public key are stored;
And work as prosthomere for what the first facility information that the user account and the public key are formed was transferred to the block chain
The adjacent node of point, each node of first facility information in the block chain is propagated.
Second aspect, the embodiment of the present application also provide a kind of device authentication method, which comprises
The identification code of the second electronic equipment is read, the second facility information of the second electronic equipment is obtained;
The first checking request to second electronic equipment is sent to one node of block chain, first checking request is taken
The second facility information with second electronic equipment, so that the node in the block chain is to second electronic equipment
It is verified;
Receive the first verification result to second electronic equipment that one node of block chain returns;
If first verification result be it is legal, by the first facility information of the first electronic equipment be sent to it is described second electricity
Sub- equipment, so that second electronic equipment is sent to one node of block chain for verifying according to first facility information
Second checking request of first electronic equipment.
Optionally, second facility information includes: the second device identification and the second key signature information;And/or it is described
First facility information includes: the first device identification and first key signing messages.
Optionally, the method also includes:
The hot spot that second electronic equipment provides is obtained according to the identification code;
Hot spot is established with second electronic equipment by the hot spot to communicate;
If first verification result be it is legal, it is described that its first facility information is sent to second electronic equipment
Step, comprising:
It is communicated by hot spot and the first facility information is sent to second electronic equipment, so that second electronic equipment
The second checking request for carrying first facility information is sent to the block chain.
Optionally, the method also includes:
It is communicated by the hot spot and radio network information is sent to second electronic equipment, so that second electronics
Equipment accesses wireless network.
Optionally, it is described first facility information is sent to second electronic equipment before, the method also includes:
Obtain random generation verification information;
If receive with the matched verification operation of the verification information, then execute and described be sent to its first facility information
The step of second electronic equipment.
The third aspect, the present embodiment provides a kind of device authentication methods, are applied to the second electronic equipment, the method packet
It includes:
Receive the first facility information of the first electronic equipment;
The second checking request to first electronic equipment is sent to one node of block chain, second checking request is taken
The first facility information with first electronic equipment so that a node of the block chain to first electronic equipment into
Row verifying;
Receive the second verification result to first electronic equipment that one node of block chain returns.
Optionally, it is described receive the first electronic equipment the first facility information the step of before, the method is also
Include:
Identification code is generated according to the second facility information, and shows the identification code, institute can be obtained by reading the identification code
State the second facility information.
Optionally, it is described receive the first electronic equipment the first facility information the step of before, the method is also
Include:
The hot information provided according to the second facility information of second electronic equipment and second electronic equipment is raw
At identification code, and show the identification code, second facility information can be obtained in the identification code and the hot spot is believed by reading
Breath.
Fourth aspect, the embodiment of the present invention also provide a kind of device authentication device, are applied to block chain node, described device
Include:
First authentication module, for receiving the first checking request to the second electronic equipment of the first electronic equipment transmission,
It verifies whether second electronic equipment is the legitimate device registered on the block chain according to first checking request, obtains
To the first verification result, first verification result is sent to first electronic equipment;
Second authentication module, for receiving the second checking request to the first electronic equipment of the second electronic equipment transmission,
It verifies whether first electronic equipment is the legitimate device registered on the block chain according to second checking request, obtains
To the second verification result, second verification result is sent to second electronic equipment;
Binding module, if showing that second electronic equipment is legitimate device for first verification result, and described
Second verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronics
Apparatus bound.
5th aspect, the embodiment of the present application also provide a kind of device authentication device, and described device includes:
Read module obtains the second facility information of the second electronic equipment for reading the identification code of the second electronic equipment;
First sending module, for sending the first checking request to second electronic equipment to one node of block chain,
First checking request carries the second facility information of second electronic equipment, so that the node in the block chain
Second electronic equipment is verified;
First result receiving module, for receiving that one node of block chain returns to second electronic equipment
One verification result;
Second sending module, if for first verification result be it is legal, the first equipment of the first electronic equipment is believed
Breath is sent to second electronic equipment, so that second electronic equipment is according to first facility information to the block chain
One node sends the second checking request for verifying first electronic equipment.
6th aspect, the embodiment of the present application also provide a kind of device authentication device, are applied to the second electronic equipment, the dress
It sets and includes:
Information receiving module, for receiving the first facility information of the first electronic equipment;
Third sending module, for sending the second checking request to first electronic equipment to one node of block chain,
Second checking request carries the first facility information of first electronic equipment, so that a node pair of the block chain
First electronic equipment is verified;
Second result receiving module, for receiving that one node of block chain returns to first electronic equipment
Two verification results.
7th aspect, the embodiment of the present application also provide a kind of electronic equipment, comprising: processor, memory and bus, it is described
Memory is stored with the executable machine readable instructions of the processor, when electronic equipment operation, the processor with it is described
Any in the above method is executed by bus communication between memory, when the machine readable instructions are executed by the processor
The step of method in embodiment.
Eighth aspect, the embodiment of the present application also provide a kind of computer readable storage medium, the computer-readable storage medium
Computer program is stored in matter, which executes any possible in above-mentioned first aspect when being run by processor
In embodiment the step of device authentication method.
Compared with prior art, the equipment of the embodiment of the present invention verification method, device and electronic equipment, by block chain
On equipment is verified, since the difficulty that block chain is tampered is big, equipment is verified and can be mentioned on block chain
The safety of high device authentication.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, special embodiment below, and appended by cooperation
Attached drawing is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram that the node on the block chain that the embodiment of the present invention one provides is interacted with each electronic equipment.
Fig. 2 is the flow chart of device authentication method provided by Embodiment 2 of the present invention.
Fig. 3 is the flow chart for the device authentication method that the embodiment of the present invention three provides.
Fig. 4 is the flow chart for the device authentication method that the embodiment of the present invention four provides.
Fig. 5 is the flow chart for the device authentication method that the embodiment of the present invention five provides.
Fig. 6 is the functional block diagram for the apparatus that the embodiment of the present invention six provides.
Fig. 7 is the functional block diagram for the apparatus that the embodiment of the present invention seven provides.
Fig. 8 is the functional block diagram for the apparatus that the embodiment of the present invention eight provides.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present invention, technical solution in the embodiment of the present invention carries out clear, complete
Ground description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Usually exist
The component of the embodiment of the present invention described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed invention to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but it is merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not doing
Every other embodiment obtained under the premise of creative work out, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile of the invention
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Internet of Things use it is universal keep user also just more convenient to the operations of various household appliances, although convenient
Bring some drawbacks.For example, there may be some security risks for household appliance.Therefore, existing to be set there are some to household electrical appliances
It is standby to implement to verify household appliance before control to improve the safety of household appliance.But existing authentication
Formula may or can have security risk, e.g., household appliance use MAC Address, equipment Serial Number as authentication mark
Identification, these attributes are all the intrinsic some attributes of household appliance, there is the possibility enumerated, once exposure, then may just not have
Method reparation;For another example many terminal devices use same password storage in code, once terminal, by decompiling, password is let out
Leakage, household appliance also have no idea to repair, provide product side and also have no idea to remedy.
It can be realized multi-party verification by following multiple embodiments based on above-mentioned consideration the application, improve making for household appliance
With safety, it is described in detail below.
Embodiment one
As shown in Figure 1, being the running environment schematic diagram of device authentication method provided in an embodiment of the present invention.In the present embodiment
Device authentication method locating for may include: the node 100 of block chain in environment, communicate with each node in block chain
First electronic equipment 200 and the second electronic equipment 300 communicated with each node in block chain.It is each in block chain
Node 100 can be communicated by network with the first electronic equipment 200 and the second electronic equipment 300, to carry out data interaction.Block
Each node in chain establishes connection with P2P (Peer to Peer) peer-to-peer network.Node 100 in block chain can be network
Server, database server, PC etc..The first above-mentioned electronic equipment 200 can be PC (personal
Computer, PC), tablet computer, smart phone, personal digital assistant (personal digital assistant, PDA)
Deng.The second above-mentioned electronic equipment 300 can be household electrical appliance, intelligentized Furniture etc..
Block chain is the decentralization distributed data base system for participating in maintenance jointly by nodes all in block chain.Block
Chain technology is to verify to know together algorithm with storing data, using distributed node to generate and update using block linked data structure
Data, utilize the intelligence being made of automatized script code at the safety for guaranteeing data transmission and access in the way of cryptography
Contract programs the completely new distributed basis framework and calculation of one kind with operation data.
Each new node that block chain is added can synchronize all data on current block chain, so that in block chain
Each node can preserve all data on block chain.
When each node has more new data, which propagates more new data other nodes in block chain, so that area
Each node in block chain preserves the more new data.
In the present embodiment, any node in block chain can receive the registration request of the first electronic equipment.The registration is asked
It asks including user account and public key.Wherein, the first electronic equipment key pair, the key pair include public key and private key.Key pair
Public key is uploaded to a node in block chain.The private key of key pair is stored in the first electronic equipment, forms user account and electronics
The binding relationship of equipment.
In the present embodiment, any node in block chain can receive the second facility information of the second electronic equipment, wherein
Second facility information may include equipment Serial Number, public key certificate and process private key signature corresponding with above-mentioned public key certificate
Sequence number.
Embodiment two
The present embodiment provides a kind of device authentication method, which is applied to management equipment safety, provides and sets
Any node in the block chain network of standby authentication server, when needing to carry out device authentication using the node, in the node
It can store the second facility information of correlation of legitimate device.Specifically, referring to Fig. 2, being provided in an embodiment of the present invention set
The flow chart of standby verification method.Detailed process shown in Fig. 2 will be described in detail below.
Step S401 receives the first checking request to the second electronic equipment that the first electronic equipment is sent, according to described
First checking request verifies whether second electronic equipment is the legitimate device registered on the block chain, obtains first and tests
Card is as a result, be sent to first electronic equipment for first verification result.
First checking request carries the second facility information of second electronic equipment.
Wherein, the first checking request can carry the second facility information of the second electronic equipment still to be tested.
It also needs to store the second facility information of the second electronic equipment before executing step S401.Therefore, make
Further to consider, device authentication method can also include: the second facility information for receiving second electronic equipment, go forward side by side
Row storage;And second facility information is transferred to the adjacent node of the present node of the block chain, by described second
Each node of the facility information in the block chain is propagated.
Specifically, before step S401, the second facility information that the node in block chain receives for the first time can be by
What the second electronic equipment was sent, it is also possible to be known by the equipment identities of unified multiple second electronic equipments sent of a management terminal
Other code.
In an example, the second electronic equipment can be TV, and TV, can be according to manufacturer couple after completing
The sequence number create-rule answered is each tv distribution equipment sequence number, public key certificate, and according to the corresponding private of the public key certificate
Key is the equipment sequence signatures generated.And TV deposits public key certificate, equipment Serial Number and sequence number Jing Guo private key signature
Storage is in the television.Further, it is saved in any node which is also further sent in block chain.
In one embodiment, second facility information includes equipment Serial Number;In the present embodiment according to
It may include: to look into that whether it is the legitimate device registered on the block chain that the first checking request verifies second electronic equipment
It askes on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;If it exists, then determine second electronics
Equipment is legal.
In another embodiment, second facility information includes equipment Serial Number and the second key signature letter
Breath;Above-mentioned verifies whether second electronic equipment is the conjunction registered on the block chain according to first checking request
Method equipment includes: on the inquiry block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;If it exists, then by institute
It states the second key signature information to be matched with the facility information, judging whether being capable of successful match;If successful match is sentenced
Fixed second electronic equipment is legal.By further to equipment Serial Number to using private key to sign, by signature
Information is further verified, and uses MAC Address, equipment Serial Number using intelligent appliance equipment if can avoid or reduce
When mark as authentication is other, these attributes are all the intrinsic some attributes of equipment, there is the possibility enumerated, once cruelly
Dew, the drawbacks of just having no idea to repair.
The first above-mentioned signing messages can be using the corresponding private key of the public key certificate stored in TV to equipment sequence
Number signing messages signed.
Further, in this embodiment the block chain used can be alliance's chain.Alliance's chain is just for some specific group
Member and limited third party, inside specifies the nodes of multiple pre-selections for book keeping operation people, and each piece of generation is by all pre-selections
Node codetermines, other access nodes can participate in business, but keep aloof from accounting procedure, other third parties can pass through the area
The open API (Application Programming Interface, application programming interface) of block chain is defined and looks into
It askes.
Step S402 receives the second checking request to the first electronic equipment that the second electronic equipment is sent, according to described
Second checking request verifies whether first electronic equipment is the legitimate device registered on the block chain, obtains second and tests
Card is as a result, be sent to second electronic equipment for second verification result.
Second checking request carries the first facility information of first electronic equipment.
In one embodiment, first facility information includes user account;Above-mentioned verifies according to described second
It includes: the inquiry block chain that whether the first electronic equipment described in requests verification, which is the legitimate device registered on the block chain,
It is upper to whether there is the corresponding user information of the user account;If it exists, then determine that first electronic equipment is legal.
In another embodiment, first facility information includes user account and the second key signature information, on
That states verifies whether first electronic equipment is that register on the block chain legal sets according to second checking request
Standby includes: on the inquiry block chain with the presence or absence of the corresponding user information of the user account;If it exists, then by described second
Key signature information is matched with the user information, and judging whether being capable of successful match;If so, determining first electronics
Equipment is legal.
Step S403, if it is legitimate device that first verification result, which shows second electronic equipment, and described second
Verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronic equipment
Binding.
Method in the present embodiment can be applied to any node in block chain, the node and the first electronic equipment and second
Electronic equipment communication connection, after the first electronic equipment and the second electronic equipment realize binding, the first electronic equipment is for control the
Two electronic equipments execute setting operation.
In an example, the second electronic equipment can be TV, and the first electronic equipment can be mobile phone, tablet computer etc.
Mobile device.By the operation of the key of the setting on mobile phone, the control to TV may be implemented.Control may include open with
It closes, sound is tuned up or turned down, program is adjusted, TV shows adjusting of picture etc..
In the bi-directional verification of step S401 and step S402, i.e. the second electronic equipment submits the verifying to the first electronic equipment
On the basis of request and the first electronic equipment are submitted to the checking request of the second electronic equipment, two-way tie up can be further realized
It is fixed, it can better ensure that the first electronic equipment of both sides and the bidirectional safe of the second electronic equipment.In the first electronic equipment and
After second electronic equipment submits checking request, then the two-way binding of the first electronic equipment and the second electronic equipment is fully achieved,
To allow the first electronic equipment to operate the second electronic equipment.The above-mentioned step S403 of device authentication method can wrap
Include pre-binding and whole grade binding.Therefore, on the basis of the above, device authentication method can also include:
Step a, if first verification result be characterized as it is legal, by first electronic equipment and second electronics
Equipment carries out pre-binding.
Step b, if second verification result be it is legal, judge that first electronic equipment is set with second electronics
It is standby whether to have carried out pre-binding;If so, first electronic equipment and second electronic equipment are realized binding.
Wherein, in block chain before receiving the first checking request to the second electronic equipment that the first electronic equipment is sent
In second electronic equipment is recorded, then it represents that second electronic equipment is legal.
In one embodiment, the binding of the first electronic equipment and the second electronic equipment can be the binding between equipment
It can be and bind the device identification number of the second electronic equipment and the first electronic equipment.
In another embodiment, the binding of the first electronic equipment and the second electronic equipment can be tying up between equipment
Surely it can be the binding using account of the middle login of the second electronic equipment and the first electronic equipment.It can be using account
The application program of network service for obtaining the offer of block chain is installed, application program applies account by one in one electronic equipment
Number obtain block chain in each node provide service.
There are also in a kind of embodiment, the binding of the first electronic equipment and the second electronic equipment can be tying up between equipment
Surely it can be the communications account binding in the second electronic equipment and the first electronic equipment.
If the second electronic equipment and third electronic equipment there are binding relationship, can inform third electronic equipment about
The message of the binding relationship of first electronic equipment and the second electronic equipment.
Further, device authentication method further include: judge second electronic equipment whether at third electronic equipment
In binding state;If so, sending unbinding prompting message to the third electronic equipment.
In one embodiment, it can be and unbinding prompting message is sent to third electronics in a manner of short message sets
Standby associated communications account.
In another embodiment, third electronic equipment can be equipped with the network service for obtaining the offer of block chain
Application program, login in the application program that above-mentioned contact binding prompting message can be sent in the third electronic equipment
Using in account, and shown by the application program.
If there are binding relationships for the second electronic equipment and third electronic equipment, it can send and test to third electronic equipment
Message is demonstrate,proved, is bound after being verified, then to the first electronic equipment and the second electronic equipment.
Further, device authentication method further include: judge second electronic equipment whether at third electronic equipment
In binding state;If so, sending verifying message to the third electronic equipment;After receiving the verifying message, implementation pair
The binding of first electronic equipment and the second electronic equipment acts.
Wherein, the node in block chain receives verifying message can be to be sent by third electronic equipment, can also
Being sent by the first electronic equipment.
Be thought of as further improving the second electronic equipment of verifying safety can on the basis of Fig. 2 further,
First electronic equipment is also verified, to realize bi-directional verification, improves the reliability of device authentication.
In some embodiments, device authentication method further include: obtained in the block chain first electronic equipment and
The binding information is transferred to adjacent node by the present node of the binding information of second electronic equipment.
In further embodiments, device authentication method further include: first electronic equipment is obtained in the block chain
The binding information is transferred to associated node with the present node of the binding information of second electronic equipment.
One application program can be installed, which can be used for obtaining each in block chain in the first electronic equipment
The network service that a node provides.Therefore, any node into block chain registration can be sent in advance in the first electronic equipment
Request.
In one embodiment, device authentication method can also include: to receive first electricity before step S401
The registration request that sub- equipment is sent, the registration request carry the public key of user account and cipher key pair;By the user account
And the public key is stored;And the first facility information that the user account and the public key are formed is transferred to the block
The adjacent node of the present node of chain propagates each node of second facility information in the block chain.
In another embodiment, device authentication method can also include: before step S401
The registration request that first electronic equipment is sent is received, the registration request carries the public key of cipher key pair;
The public key is stored, and generates user account at random or according to setting rule;
The user account of generation is sent to the first electronic equipment, and receives first electronic equipment according to above-mentioned public key
Corresponding private key is the user account after user account signature;
And work as prosthomere for what the first facility information that the user account and the public key are formed was transferred to the block chain
The adjacent node of point, each node of second facility information in the block chain is propagated.
By the way that user account is signed using private key, the first electronic equipment access block chain can be preferably determined
The safety of the access process of any node avoids the node in some underproof electronic equipment access block chains, improves equipment
The safety of verifying.
Embodiment three
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two
Partially similar, the method in embodiment two is executed by the node in block chain, and the method in the present embodiment is set by the first electronics
It is standby to execute.Close in this present embodiment with overlaps will not be repeated in embodiment two.As shown in figure 3, setting in the present embodiment
Standby verification method includes the following steps.
Step S501 reads the identification code of the second electronic equipment, obtains the second facility information of the second electronic equipment.
In one embodiment, the second electronic equipment after powering, shows an identification code, identification in display interface
Code includes the second facility information.Second facility information includes equipment Serial Number, public key certificate and the sequence number Jing Guo private key signature.
Above-mentioned identification code can be two dimensional code, bar code, character string etc..
In another embodiment, the identification code of entity can be posted on the second electronic equipment.
It is described so that identification code is two dimensional code as an example below.
First electronic equipment starts identification code scanning function and reads two dimensional code, to obtain the second equipment letter of two dimensional code carrying
Breath.
In an example, the first electronic equipment can read two dimension by the scanning function in third party application
Code, third party application can be the application program that wechat, QQ etc. have " sweep and sweep " function.
In another example, the network service for obtaining the offer of block chain can be installed in the first electronic equipment
Application program can have the function of scanning the two-dimensional code in the application program.
Step S502 sends the first checking request to second electronic equipment to one node of block chain.
First checking request carries the second facility information of second electronic equipment, so that one in the block chain
Node verifies second electronic equipment.
Step S503 receives the first verification result to second electronic equipment that one node of block chain returns.
Step S504, if first verification result be it is legal, the first facility information of first electronic equipment is sent out
Second electronic equipment is given, so that second electronic equipment is according to first facility information to one section of block chain
Point sends the second checking request for verifying first electronic equipment.
Further, in order to enable the first electronic equipment to be in communication with each other with the second electronic equipment, data are transmitted.Therefore,
Second electronic equipment opens a hot spot on startup, and the identification code of the second above-mentioned electronic equipment can also carry the second electricity
The username and password of the hot spot of sub- opening of device;First electronic equipment can according to the username and password of the hot spot realize with
Second electronic equipment establishes connection.By starting a hot spot on the second electronic equipment, can the second electronic equipment not into
In the case where row network connection, the mutual data transmission with the first electronic equipment also can be realized, reduce user to the second electricity
The operation of sub- equipment.
Specifically, device authentication method further include: the heat that second electronic equipment provides is obtained according to the identification code
Point;It is established and is communicated to connect by the hot spot and second electronic equipment;If first verification result be it is legal, by the
One facility information is sent to second electronic equipment, so that second electronic equipment is sent described in carrying to the block chain
Second checking request of the first facility information.
Further, radio network information can also be sent to the second electronic equipment, the second electronics by the first electronic equipment
Equipment accesses wireless network according to the radio network information.
Second electronic equipment then can by the wireless network of access access block chain in node, so as to realize to
Node on block chain sends the checking request of the verifying to the first electronic equipment.
In order to further make the safety of the communication before the first electronic equipment and the second electronic equipment, can also pass
Identifying code is generated before transmission of data to verify the user of operation.
It is described first facility information is sent to second electronic equipment before, the method also includes: obtain with
Machine generates verification information;If receive with the matched verification operation of the verification information, then execute step for the first facility information
It is sent to second electronic equipment.
After obtaining random generation verification information, it may be displayed on the first electronic equipment, also may be displayed on the second electronics
In equipment.
In an example, verification information can be character string, can wrap with the matched verification operation of the verification information
Include input character string identical with the character string.In another example, verification information can be gesture figure, believe with the verifying
Ceasing matched verification operation may include detecting to form slide corresponding with gesture figure in touch interface.There are one real
In example, verification information can be multiple images and select the specified image in image, grasp with the matched verifying of the verification information
Work may include the selection operation received to specified image.
Further, if one node of block chain is bound the first electronic equipment and the second electronic equipment, first
Electronic equipment can also receive the notice of the binding result of one node of block chain transmission.
Example IV
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two
Partially similar, the method in embodiment two is executed by the node in block chain, and the method in the present embodiment is set by the second electronics
It is standby to execute.Close in this present embodiment with overlaps will not be repeated in embodiment two.As shown in figure 4, setting in the present embodiment
Standby verification method includes the following steps.
Step S601 receives the first facility information of the first electronic equipment.
In one embodiment, before step S601, device authentication method further include: raw according to the second facility information
It at identification code, and shows the identification code, second facility information can be obtained by reading the identification code.
In another embodiment, it before step S601, is posted on the second electronic equipment according to the second facility information
The identification code of generation.
First facility information includes user account, public key certificate and user account and public key certificate Jing Guo private key signature,
SSID, password, chain address and port etc..
Step S602 sends the second checking request to first electronic equipment to one node of block chain.
The second above-mentioned checking request carries the first facility information of first electronic equipment, so that the block chain
A node first electronic equipment is verified.
Step S603 receives the second verification result to first electronic equipment that one node of block chain returns.
Further, if one node of block chain is bound the first electronic equipment and the second electronic equipment, second
Electronic equipment can also receive the notice of the binding result of one node of block chain transmission.
It can also include receiving the radio network information that the first electronic equipment is sent to be sent to second before step S601
Electronic equipment, the second electronic equipment access wireless network according to the radio network information.It is sent by using the first electronic equipment
Node of the radio network information into block chain carry out wireless communication, it is possible to reduce the second electronic equipment is needed through other sides
The operation of formula access network, it is possible to reduce setting of the user to the second electronic equipment improves verification efficiency.
Embodiment five
The embodiment of the present application also provides a kind of device authentication method, the method in the present embodiment and the method in embodiment two
Partially similar, method in embodiment two is executed by the node in block chain, the method in the present embodiment by include block chain,
The system of first electronic equipment and the second electronic equipment executes.Close in this present embodiment in place of repetition in embodiment two no longer
It repeats.As shown in figure 5, the device authentication method in the present embodiment includes the following steps.With the first electronic equipment in the present embodiment
It is mobile device, the second electronic equipment is described for smart machine.
Public key in the secret key pair of generation is sent to one node of block chain by step S701, mobile device, realizes registration.
Its second facility information is sent to one node of block chain by step S702, smart machine.
Step S703, mobile device scan the identification code of smart machine, obtain the second facility information of smart machine.
Step S704, mobile device send the first checking request to smart machine to one node of block chain.
First checking request carries the second facility information of second electronic equipment, so that one in the block chain
Node verifies second electronic equipment.
Step S705, one node of block chain verify smart machine according to the second facility information of preservation.
Step S706, if verifying is legal, mobile device and smart machine are carried out pre-binding by one node of block chain.
Step S707, mobile device are established with smart machine and are led to by identifying that identification code obtains the hot spot of smart machine
Letter connection.
Its first facility information is sent to smart machine by step S708, mobile device.
Step S709, smart machine think that one node of block chain sends the second checking request.
Second checking request carries the first above-mentioned facility information.
Step S710, one node of block chain verify mobile device according to the first facility information of preservation.
Step S711, if verifying is legal, mobile device and smart machine are carried out ultimate binding by one node of block chain.
Other details about the present embodiment can refer to description of the above embodiments two into example IV, herein not
It repeats again.
The safety that the second electronic equipment can be improved by a complete bi-directional verification, also can be improved the first electronics
The legitimacy of the operation of equipment, so as to the first electronic equipment to the reliability of the operation of the second electronic equipment.
Embodiment six
Conceived based on same application, the device authentication method pair provided with embodiment two is be provided in the embodiment of the present application
The device authentication device answered, the principle and the above-mentioned implementation of the embodiment of the present application solved the problems, such as due to the device in the embodiment of the present application
Device authentication method in example two is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 6, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested
Card device includes: the first authentication module 801, the second authentication module 802 and binding module 803;Wherein
First authentication module 801, for receiving asking to the first verifying of the second electronic equipment for the first electronic equipment transmission
It asks, verifies whether second electronic equipment is that register on the block chain legal sets according to first checking request
It is standby, the first verification result is obtained, first verification result is sent to first electronic equipment.
First checking request carries the second facility information of second electronic equipment.
Second authentication module 802, for receiving asking to the second verifying of the first electronic equipment for the second electronic equipment transmission
It asks, verifies whether first electronic equipment is that register on the block chain legal sets according to second checking request
It is standby, the second verification result is obtained, second verification result is sent to second electronic equipment.
Second checking request carries the first facility information of first electronic equipment.
Binding module 803, if showing that second electronic equipment is legitimate device, and institute for first verification result
It states the second verification result and shows that first electronic equipment is legitimate device, then by first electronic equipment and second electricity
Sub- apparatus bound.
Device authentication device in the embodiment of the present application, is applied to block chain node, the node and the first electronic equipment and
After the communication connection of second electronic equipment, first electronic equipment and second electronic equipment realize binding, first electricity
Sub- equipment executes setting operation for controlling second electronic equipment.
Further, in this embodiment device can be also used for execute embodiment two in other steps, about this reality
The other details for applying example can also further in reference implementation example two description, will no longer repeat one by one in the present embodiment.
Embodiment seven
Conceived based on same application, the device authentication method pair provided with embodiment three is be provided in the embodiment of the present application
The device authentication device answered, the principle solved the problems, such as due to the device in the embodiment of the present application and the embodiment of the present application above equipment
Verification method is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 7, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested
Card device: read module 901, the first sending module 902, the first result receiving module 903 and the second sending module 904;Its
In:
Read module 901 obtains the second equipment letter of the second electronic equipment for reading the identification code of the second electronic equipment
Breath;
First sending module 902 asks the first verifying of second electronic equipment for sending to one node of block chain
It asks, first checking request carries the second facility information of second electronic equipment, so that one in the block chain
Node verifies second electronic equipment;
First result receiving module 903, for receiving that one node of block chain returns to second electronic equipment
The first verification result;
Second sending module 904, if for first verification result be it is legal, by the first of first electronic equipment
Facility information is sent to second electronic equipment, so that second electronic equipment is according to first facility information to described
One node of block chain sends the second checking request for verifying first electronic equipment.
Further, in this embodiment device can be also used for execute embodiment three in other steps, about this reality
The other details for applying example can also further in reference implementation example three description, will no longer repeat one by one in the present embodiment.
Embodiment eight
Conceived based on same application, the device authentication method pair provided with example IV is be provided in the embodiment of the present application
The device authentication device answered, the principle solved the problems, such as due to the device in the embodiment of the present application and the embodiment of the present application above equipment
Verification method is similar, therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Referring to Fig. 8, being the functional block diagram of device authentication device provided in an embodiment of the present invention.The equipment is tested
Card device includes: information receiving module 1001, third sending module 1002 and the second result receiving module 1003;Wherein:
Information receiving module 1001, for receiving the first facility information of the first electronic equipment;
Third sending module 1002 asks the second verifying of first electronic equipment for sending to one node of block chain
It asks, second checking request carries the first facility information of first electronic equipment, so that a section of the block chain
Point verifies first electronic equipment;
Second result receiving module 1003, for receiving that one node of block chain returns to first electronic equipment
The second verification result.
Further, in this embodiment device can be also used for execute example IV in other steps, about this reality
The other details for applying example can also further in reference implementation example four description, will no longer repeat one by one in the present embodiment.
The equipment of the embodiment of the present invention verification method, device and electronic equipment, by testing on block chain equipment
Card, since the difficulty that block chain is tampered is big, carrying out verifying to equipment on block chain can be improved the peace of device authentication
Quan Xing.In addition, being verified by the first electronic equipment to the second electronic equipment, the second electronic equipment is also to the first electronic equipment
It is verified, effective bi-directional verification may be implemented, improve the safety that equipment uses.Further, pass through the application of block chain
The information that cloud can be effectively prevented is tampered, and can also further improve the validity of verifying.
In addition, the embodiment of the present application also provides a kind of computer readable storage medium, on the computer readable storage medium
It is stored with computer program, device authentication described in above method embodiment is executed when which is run by processor
The step of method.
The computer program product of device authentication method provided by the embodiment of the present application, including storing program code
Computer readable storage medium, the instruction that said program code includes can be used for executing equipment described in above method embodiment
The step of verification method, for details, reference can be made to above method embodiments, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the present invention, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the present invention can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, technical solution of the present invention is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.It needs
Illustrate, herein, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship or sequence on border.Moreover, the terms "include", "comprise" or its any other variant are intended to the packet of nonexcludability
Contain, so that the process, method, article or equipment for including a series of elements not only includes those elements, but also including
Other elements that are not explicitly listed, or further include for elements inherent to such a process, method, article, or device.
In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Process, method, article or equipment in there is also other identical elements.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field
For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair
Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any
Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain
Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (19)
1. a kind of device authentication method, which is characterized in that be applied to block chain node, which comprises
The first checking request to the second electronic equipment for receiving the transmission of the first electronic equipment, is tested according to first checking request
Demonstrate,prove whether second electronic equipment is the legitimate device registered on the block chain, obtains the first verification result, it will be described
First verification result is sent to first electronic equipment,
The second checking request to the first electronic equipment for receiving the transmission of the second electronic equipment, is tested according to second checking request
Demonstrate,prove whether first electronic equipment is the legitimate device registered on the block chain, obtains the second verification result, it will be described
Second verification result is sent to second electronic equipment;
If first verification result shows that second electronic equipment is legitimate device, and second verification result shows institute
Stating the first electronic equipment is legitimate device, then binds first electronic equipment and second electronic equipment.
2. the method as described in claim 1, which is characterized in that first checking request carries second electronic equipment
The second facility information;Second facility information includes equipment Serial Number and the second key signature information;It is described according to institute
It states the first checking request and verifies whether second electronic equipment is the packet the legitimate device registered on the block chain the step of
It includes:
It inquires on the block chain with the presence or absence of the corresponding facility information of the equipment Serial Number;
If it exists, then the second key signature information is matched with the facility information, judges whether to match into
Function;
If successful match, determine that second electronic equipment is legal.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
The second facility information of second electronic equipment is received, and is stored;
And second facility information is transferred to the adjacent node of the present node of the block chain, by second equipment
Each node of the information in the block chain is propagated.
4. the method as described in claim 1, which is characterized in that the method also includes:
Judge whether second electronic equipment with third electronic equipment is in binding state;
If so, sending unbinding prompting message to the third electronic equipment.
5. the method as described in claim 1, which is characterized in that the method also includes:
The present node that the binding information of first electronic equipment and second electronic equipment is obtained in the block chain will
The binding information is transferred to adjacent node.
6. the method as described in claim 1, which is characterized in that the method also includes:
The registration request that first electronic equipment is sent is received, the registration request carries the public affairs of user account and cipher key pair
Key;
The user account and the public key are stored;
And the first facility information that the user account and the public key are formed is transferred to the present node of the block chain
Adjacent node propagates each node of first facility information in the block chain.
7. a kind of device authentication method, which is characterized in that be applied to the first electronic equipment, which comprises
The identification code of the second electronic equipment is read, the second facility information of the second electronic equipment is obtained;
The first checking request to second electronic equipment is sent to one node of block chain, first checking request carries
Second facility information of second electronic equipment, so that the node in the block chain carries out second electronic equipment
Verifying;
Receive the first verification result to second electronic equipment that one node of block chain returns;
If first verification result be it is legal, by the first facility information of first electronic equipment be sent to it is described second electricity
Sub- equipment, so that second electronic equipment is sent to one node of block chain for verifying according to first facility information
Second checking request of first electronic equipment.
8. the method for claim 7, which is characterized in that second facility information includes: the second device identification and the
Two key signature information;And/or first facility information includes: the first device identification and first key signing messages.
9. the method for claim 7, which is characterized in that the method also includes:
The hot spot that second electronic equipment provides is obtained according to the identification code;
Hot spot is established with second electronic equipment by the hot spot to communicate;
If first verification result be it is legal, first facility information by first electronic equipment is sent to described the
The step of two electronic equipments, comprising:
It is communicated by hot spot and the first facility information is sent to second electronic equipment, so that second electronic equipment is to institute
It states block chain and sends the second checking request for carrying first facility information.
10. method as claimed in claim 9, which is characterized in that the method also includes:
It is communicated by the hot spot and radio network information is sent to second electronic equipment, so that second electronic equipment
Access wireless network.
11. the method for claim 7, which is characterized in that believe in first equipment by first electronic equipment
Breath is sent to before second electronic equipment, the method also includes:
Obtain random generation verification information;
If receive with the matched verification operation of the verification information, then execute first by first electronic equipment and set
The step of standby information is sent to second electronic equipment.
12. a kind of device authentication method, which is characterized in that be applied to the second electronic equipment, which comprises
Receive the first facility information of the first electronic equipment;
The second checking request to first electronic equipment is sent to one node of block chain, second checking request carries
First facility information of first electronic equipment a, so that node of the block chain tests first electronic equipment
Card;
Receive the second verification result to first electronic equipment that one node of block chain returns.
13. method as claimed in claim 12, which is characterized in that in first equipment for receiving the first electronic equipment
Before the step of information, the method also includes:
Identification code is generated according to the second facility information, and shows the identification code, can be obtained described the by reading the identification code
Two facility informations.
14. method as claimed in claim 12, which is characterized in that in first equipment for receiving the first electronic equipment
Before the step of information, the method also includes:
It is generated and is known according to the hot information that the second facility information of second electronic equipment and second electronic equipment provide
Other code, and show the identification code, second facility information and the hot information can be obtained by reading the identification code.
15. a kind of device authentication device, which is characterized in that be applied to block chain node, described device includes:
First authentication module, for receiving the first checking request to the second electronic equipment of the first electronic equipment transmission, according to
First checking request verifies whether second electronic equipment is the legitimate device registered on the block chain, obtains
First verification result is sent to first electronic equipment by one verification result;
Second authentication module, for receiving the second checking request to the first electronic equipment of the second electronic equipment transmission, according to
Second checking request verifies whether first electronic equipment is the legitimate device registered on the block chain, obtains
Second verification result is sent to second electronic equipment by two verification results;
Binding module, if showing that second electronic equipment is legitimate device for first verification result, and described second
Verification result shows that first electronic equipment is legitimate device, then by first electronic equipment and second electronic equipment
Binding.
16. a kind of device authentication device, which is characterized in that be applied to the first electronic equipment, described device includes:
Read module obtains the second facility information of the second electronic equipment for reading the identification code of the second electronic equipment;
First sending module, it is described for sending the first checking request to second electronic equipment to one node of block chain
First checking request carries the second facility information of second electronic equipment, so that the node in the block chain is to institute
The second electronic equipment is stated to be verified;
First result receiving module, for receiving testing the first of second electronic equipment for one node of the block chain return
Demonstrate,prove result;
Second sending module, if for first verification result be it is legal, the first equipment of first electronic equipment is believed
Breath is sent to second electronic equipment, so that second electronic equipment is according to first facility information to the block chain
One node sends the second checking request for verifying first electronic equipment.
17. a kind of device authentication device, which is characterized in that be applied to the second electronic equipment, described device includes:
Information receiving module, for receiving the first facility information of the first electronic equipment;
Third sending module, it is described for sending the second checking request to first electronic equipment to one node of block chain
Second checking request carries the first facility information of first electronic equipment, so that a node of the block chain is to described
First electronic equipment is verified;
Second result receiving module, for receiving testing the second of first electronic equipment for one node of the block chain return
Demonstrate,prove result.
18. a kind of electronic equipment characterized by comprising processor, memory and bus, the memory are stored with described
The executable machine readable instructions of processor, when electronic equipment operation, by total between the processor and the memory
Line communication, execution is such as the method as described in claim 1 to 14 is any when the machine readable instructions are executed by the processor
Step.
19. a kind of computer readable storage medium, which is characterized in that be stored with computer journey on the computer readable storage medium
Sequence, the step of method as described in claim 1 to 14 is any is executed when which is run by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811332115.5A CN109492377A (en) | 2018-11-09 | 2018-11-09 | Device authentication method, apparatus and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811332115.5A CN109492377A (en) | 2018-11-09 | 2018-11-09 | Device authentication method, apparatus and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109492377A true CN109492377A (en) | 2019-03-19 |
Family
ID=65695539
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811332115.5A Pending CN109492377A (en) | 2018-11-09 | 2018-11-09 | Device authentication method, apparatus and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492377A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166460A (en) * | 2019-05-24 | 2019-08-23 | 北京思源互联科技有限公司 | Register method and device, storage medium, the electronic device of service account |
CN110599653A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN115102795A (en) * | 2022-08-26 | 2022-09-23 | 北京盈泽世纪科技发展有限公司 | Communication security verification method and system |
CN115150109A (en) * | 2021-03-29 | 2022-10-04 | 中移(上海)信息通信科技有限公司 | Authentication method, device and related equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441989A (en) * | 2013-08-05 | 2013-12-11 | 大唐移动通信设备有限公司 | Authentication and information processing method and device |
CN103716794A (en) * | 2013-12-25 | 2014-04-09 | 北京握奇数据***有限公司 | Two-way safety verification method and system based on portable device |
CN106101147A (en) * | 2016-08-12 | 2016-11-09 | 北京同余科技有限公司 | A kind of method and system realizing smart machine and remote terminal dynamic encryption communication |
CN107592293A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | The means of communication, digital certificate management method, device and electronic equipment between block chain node |
CN108769186A (en) * | 2018-05-28 | 2018-11-06 | 中国联合网络通信集团有限公司 | service authority control method and device |
-
2018
- 2018-11-09 CN CN201811332115.5A patent/CN109492377A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103441989A (en) * | 2013-08-05 | 2013-12-11 | 大唐移动通信设备有限公司 | Authentication and information processing method and device |
CN103716794A (en) * | 2013-12-25 | 2014-04-09 | 北京握奇数据***有限公司 | Two-way safety verification method and system based on portable device |
CN106101147A (en) * | 2016-08-12 | 2016-11-09 | 北京同余科技有限公司 | A kind of method and system realizing smart machine and remote terminal dynamic encryption communication |
CN107592293A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | The means of communication, digital certificate management method, device and electronic equipment between block chain node |
CN108769186A (en) * | 2018-05-28 | 2018-11-06 | 中国联合网络通信集团有限公司 | service authority control method and device |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166460A (en) * | 2019-05-24 | 2019-08-23 | 北京思源互联科技有限公司 | Register method and device, storage medium, the electronic device of service account |
CN110166460B (en) * | 2019-05-24 | 2021-12-14 | 北京思源理想控股集团有限公司 | Service account registration method and device, storage medium and electronic device |
CN110599653A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN110599653B (en) * | 2019-09-11 | 2022-02-11 | 腾讯科技(深圳)有限公司 | Access control unlocking method, device and storage medium |
CN111050326A (en) * | 2019-11-28 | 2020-04-21 | 泰康保险集团股份有限公司 | Short message verification method, device, equipment and medium based on block chain |
CN111050326B (en) * | 2019-11-28 | 2023-08-25 | 泰康保险集团股份有限公司 | Block chain-based short message verification method, device, equipment and medium |
CN115150109A (en) * | 2021-03-29 | 2022-10-04 | 中移(上海)信息通信科技有限公司 | Authentication method, device and related equipment |
CN115102795A (en) * | 2022-08-26 | 2022-09-23 | 北京盈泽世纪科技发展有限公司 | Communication security verification method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109492377A (en) | Device authentication method, apparatus and electronic equipment | |
CN109756485B (en) | Electronic contract signing method, electronic contract signing device, computer equipment and storage medium | |
CN107508796B (en) | A kind of data communications method and device | |
CN102577230B (en) | Low-latency peer session establishment | |
Nosouhi et al. | Blockchain for secure location verification | |
EP1610202A1 (en) | Using a portable security token to facilitate public key certification for devices in a network | |
CN105453099B (en) | For showing the information processing equipment, information processing method and the computer program that correspond to the information of encryption key | |
CN105635062B (en) | The verification method and device of network access equipment | |
CN105099707B (en) | A kind of offline authentication method, server and system | |
Gambs et al. | Prover anonymous and deniable distance-bounding authentication | |
CN108900507A (en) | Block chain real name identification method and system | |
CN106230784A (en) | A kind of device authentication method and device | |
JP2008312048A (en) | Authentication method of information terminal | |
Sethi et al. | Misbinding attacks on secure device pairing and bootstrapping | |
CN109981287A (en) | A kind of code signature method and its storage medium | |
Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
Lee et al. | A user-friendly authentication solution using NFC card emulation on android | |
Hajny et al. | Attribute‐based credentials with cryptographic collusion prevention | |
Li et al. | An improved authentication with key agreement scheme on elliptic curve cryptosystem for global mobility networks | |
Armknecht et al. | On RFID privacy with mutual authentication and tag corruption | |
Frederiksen | A holistic approach to enhanced security and privacy in digital health passports | |
Payeras-Capellà et al. | Design and performance evaluation of two approaches to obtain anonymity in transferable electronic ticketing schemes | |
GH et al. | A security approach to build a trustworthy ubiquitous learning system | |
Golaszewski et al. | Project-based learning continues to inspire cybersecurity students: the 2018--2019 SFS research studies at UMBC | |
Alshehri et al. | Formally defining NFC M-coupon requirements, with a case study |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190319 |
|
RJ01 | Rejection of invention patent application after publication |