CN110766845A - Identification method and device for power construction user information and computer equipment - Google Patents

Identification method and device for power construction user information and computer equipment Download PDF

Info

Publication number
CN110766845A
CN110766845A CN201910856915.5A CN201910856915A CN110766845A CN 110766845 A CN110766845 A CN 110766845A CN 201910856915 A CN201910856915 A CN 201910856915A CN 110766845 A CN110766845 A CN 110766845A
Authority
CN
China
Prior art keywords
information
power construction
key
encrypted information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910856915.5A
Other languages
Chinese (zh)
Inventor
陆国俊
汤寿泉
朱学文
吴晖
江涛
李媛媛
姚晓健
陈畅
张志亮
杨荣霞
李站
郭俊峰
姚泽林
邹俊毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Panicle Energy Comprehensive Energy Co Ltd
China Southern Power Grid Co Ltd
Guangzhou Power Supply Bureau Co Ltd
Original Assignee
Guangzhou Panicle Energy Comprehensive Energy Co Ltd
China Southern Power Grid Co Ltd
Guangzhou Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Panicle Energy Comprehensive Energy Co Ltd, China Southern Power Grid Co Ltd, Guangzhou Power Supply Bureau Co Ltd filed Critical Guangzhou Panicle Energy Comprehensive Energy Co Ltd
Priority to CN201910856915.5A priority Critical patent/CN110766845A/en
Publication of CN110766845A publication Critical patent/CN110766845A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/06Energy or water supply

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Water Supply & Treatment (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Public Health (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a method and a device for identifying power construction user information, computer equipment and a storage medium. The method comprises the following steps: receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key; verifying the encrypted information to obtain a verification result; according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key; decrypting the encrypted information according to the second key to obtain power construction user information; and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal. By the method, the identification safety of the power construction user information can be improved.

Description

Identification method and device for power construction user information and computer equipment
Technical Field
The present application relates to the field of information identification technologies, and in particular, to a method and an apparatus for identifying power construction user information, a computer device, and a storage medium.
Background
With the rapid development of electric power technology, the safety operation level of an electric power construction site is continuously improved, more and more electric power construction sites are managed in a closed mode, and electric power construction user information entering and exiting the electric power construction site is identified through an access control terminal.
At present, the identification mode of the power construction user information generally includes that an access control terminal acquires power construction user information in a set area, and the power construction user information is sent to a corresponding server through a network, so that the power construction user information is identified through the server. However, in the network transmission process, the power construction user information is easily tampered, so that the power construction user information transmitted to the server is unsafe, and thus the identification security of the power construction user information is low.
Disclosure of Invention
In view of the above, it is necessary to provide a method and an apparatus for identifying power construction user information, a computer device, and a storage medium, which can improve the safety of identification of power construction user information.
A method for identifying power construction user information, the method comprising:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encrypted information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
decrypting the encrypted information according to the second key to obtain the power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
In one embodiment, before verifying the encrypted information and obtaining a verification result, the method further includes:
receiving a first verification code of encrypted information sent by an entrance guard terminal of a power construction site;
the verifying the encrypted information to obtain a verification result includes:
acquiring a second verification code of the encrypted information;
matching the second verification code of the encrypted information with the first verification code to obtain a matching result;
and generating a verification result according to the matching result.
In one embodiment, the obtaining the second verification code of the encrypted information includes:
acquiring a preset verification code statistical instruction;
and counting the encrypted information according to the preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
In one embodiment, the verifying the encrypted information to obtain a verification result further includes:
acquiring a network IP address carried by the encrypted information;
matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result;
and generating a verification result according to the matching result.
In one embodiment, the confirming that the encrypted information is verified according to the verification result includes:
extracting the matching result in the verification result;
and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, or the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to pass.
In one embodiment, after generating the identification success information if the power construction user information is successfully matched with the preset power construction user information, the method further includes:
acquiring a third key;
encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key;
the successful recognition information is sent to the entrance guard terminal of the electric power construction site, and the method comprises the following steps:
and sending the encrypted identification success information to the electric power construction site access control terminal.
In one embodiment, the receiving encryption information and key identification sent by the electric power construction site access control terminal includes:
receiving encryption information and a key identification sent by an entrance guard terminal of a power construction site through a preset network channel;
and/or the presence of a gas in the gas,
the successful recognition information is sent to the entrance guard terminal of the electric power construction site, and the method comprises the following steps:
and sending the identification success information to the electric power construction site access control terminal through the preset network channel.
An identification apparatus of power construction user information, the apparatus comprising:
the information receiving module is used for receiving encrypted information and a key identification which are sent by the electric power construction site access control terminal; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
the information verification module is used for verifying the encrypted information to obtain a verification result;
the key obtaining module is used for confirming that the encrypted information passes the verification according to the verification result and obtaining a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
the information decryption module is used for decrypting the encrypted information according to the second secret key to obtain the power construction user information;
and the information sending module is used for generating successful identification information if the power construction user information is successfully matched with preset power construction user information, and sending the successful identification information to the power construction site access control terminal.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encrypted information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
decrypting the encrypted information according to the second key to obtain the power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encrypted information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
decrypting the encrypted information according to the second key to obtain the power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
The identification method, the identification device, the computer equipment and the storage medium of the power construction user information receive encrypted information and a key identification which are sent by a power construction site access control terminal, wherein the encrypted information is obtained by encrypting the power construction user information by using a first key by the terminal; verifying the encrypted information to obtain a verification result; according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key; decrypting the encrypted information according to the second key to obtain power construction user information; if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to a power construction site access control terminal; the purpose of receiving the encrypted information of the power construction user information sent by the power construction site access control terminal is achieved, the transmission safety of the power construction user information is guaranteed, the information is prevented from being tampered, and therefore the identification safety of the power construction user information is improved; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
Drawings
Fig. 1 is an application scenario diagram of an identification method of power construction user information in one embodiment;
FIG. 2 is a flow chart illustrating a method for identifying power construction user information according to an embodiment;
fig. 3 is a schematic flow chart illustrating a method for identifying power construction user information according to another embodiment;
FIG. 4 is a block diagram showing an example of a structure of an apparatus for identifying power construction user information;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for identifying the power construction user information can be applied to the application environment shown in fig. 1. Wherein, the electric power construction site access control terminal 110 and the server 120 communicate through a network. The electric power construction site access control terminal 110 is configured to collect electric power construction user information of a set area, encrypt the electric power construction user information by using a first key to obtain encrypted information, and send the encrypted information and a key identifier corresponding to the first key to the corresponding server 120. The server 120 verifies the encrypted information to obtain a verification result; according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; wherein the second key matches the first key; decrypting the encrypted information according to the second key to obtain power construction user information; if the power construction user information is successfully matched with the preset power construction user information, identification success information is generated, and the identification success information is sent to the power construction site access control terminal 110. The electric power construction site access control terminal 110 may be an electric power construction site pass gate terminal, an electric power construction site attendance registration terminal, or the like; the server 120 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a method for identifying power construction user information is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step S201, receiving encryption information and a secret key identification sent by an entrance guard terminal of a power construction site; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key.
In this step, the electric power construction site access terminal refers to a terminal for managing personnel who enter and exit the electric power construction site, such as an electric power construction site pass gate terminal, an electric power construction site attendance registration terminal, and the like. The first key is a parameter for encrypting the power construction user information, and can be a symmetric key or an asymmetric key; the key identification is information for identifying the first key, and has a one-to-one correspondence relationship with the first key.
In the specific implementation, the electric power construction site access control terminal acquires electric power construction user information in a set area, such as face image information, fingerprint information, identity card information and the like, and encrypts the acquired electric power construction user information by using a first secret key stored by the electric power construction site access control terminal, such as a unique secret key distributed to the electric power construction site access control terminal and the like, so as to obtain encrypted information; and acquiring a key identifier of the first key, and sending the encrypted information and the key identifier to a corresponding server.
In one embodiment, an electric power construction site access terminal is taken as an example of an electric power construction site passing gate terminal; the electric power construction site access control system comprises an electric power construction site access gate terminal, a face image acquisition system and a face image acquisition system.
Step S202, the encrypted information is verified to obtain a verification result.
In the specific implementation, the server acquires a preset encryption information verification file, comprehensively verifies the encryption information according to the preset encryption information verification file, judges whether the encryption information is tampered, and if the encryption information is tampered, indicates that the encryption information is not verified; if the encrypted information is not tampered, the encrypted information is verified to pass, and therefore a verification result of the encrypted information is obtained; the preset encrypted information verification file is a file used for verifying the data integrity of the encrypted information. In this way, by verifying the encrypted information, the encrypted information can be effectively prevented from being tampered, and the identification safety of the power construction user information is further improved.
Step S203, according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identification from a preset key bank; the second key matches the first key.
In this step, the preset key library refers to a database for storing keys, and stores second keys corresponding to a plurality of key identifiers; the second key is a parameter for decrypting the encrypted information, and may be a symmetric key or an asymmetric key. The second key is matched with the first key, and can be equal to the first key; it is also possible that the second key corresponds to the first key, for example, the first key is a public key and the second key is a private key corresponding to the first key.
In specific implementation, the server obtains a plurality of second keys in advance, and stores the obtained second keys into the preset key database according to the key identifiers in a classified manner, so as to store the second keys corresponding to the plurality of key identifiers through the preset key database. And the server analyzes the obtained verification result, if the verification result is that the encrypted information is not tampered, the encrypted information is confirmed to pass the verification, and a second key corresponding to the key identification is obtained from a preset key bank.
And step S204, decrypting the encrypted information according to the second secret key to obtain the power construction user information.
In specific implementation, the server decrypts the encrypted information according to the second secret key to obtain the power construction user information collected by the terminal; therefore, the power construction user information can be prevented from being tampered in the transmission process, the transmission safety of the power construction user information is guaranteed, and the identification safety of the power construction user information is improved.
And S205, if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
In the specific implementation, a server collects a plurality of electric power construction user information in advance as preset electric power construction user information; and matching the obtained power construction user information with preset power construction user information, if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to a power construction site access control terminal.
For example, the server matches the face image information of the power construction user with the face image information of a preset power construction user, if the matching is successful, recognition success information is generated, and the recognition success information is sent to the power construction site access control terminal; therefore, the decrypted power construction user information is identified, so that the information can be prevented from being tampered, the identification safety of the power construction user information is reduced, and the identification safety of the power construction user information is improved.
In addition, the electric power construction site access control terminal can execute corresponding control operation according to the identification success information, such as opening a gate of a gate machine.
In the identification method of the power construction user information, encryption information and a key identification which are sent by a power construction site entrance guard terminal are received, wherein the encryption information is obtained by encrypting the power construction user information by using a first key by the terminal; verifying the encrypted information to obtain a verification result; according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key; decrypting the encrypted information according to the second key to obtain power construction user information; if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to a power construction site access control terminal; the purpose of receiving the encrypted information of the power construction user information sent by the power construction site access control terminal is achieved, the transmission safety of the power construction user information is guaranteed, the information is prevented from being tampered, and therefore the identification safety of the power construction user information is improved; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
In an embodiment, before the step S202 verifies the encrypted information to obtain a verification result, the method further includes: and receiving a first verification code of the encrypted information sent by the access control terminal of the power construction site.
In this embodiment, the first verification code refers to unique information, such as a hash value, for identifying the encrypted information.
In the specific implementation, the entrance guard terminal of the power construction site acquires a preset verification code statistical instruction; counting the encrypted information according to a preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a first verification code of the encrypted information; wherein, the verification code statistic instruction is an instruction for counting the verification code of the encrypted information.
For example, the electric power construction site access control terminal obtains a preset hash value counting instruction, counts the hash value of the encrypted information according to the preset hash value counting instruction, and uses the hash value as a first verification code of the encrypted information.
In the embodiment, the first verification code of the encrypted information sent by the entrance guard terminal of the power construction site is received, so that the encrypted information can be verified conveniently and subsequently according to the first verification code, the encrypted information is prevented from being tampered, and the transmission safety of the power construction user information is further improved.
In an embodiment, the step S202 of verifying the encrypted information to obtain a verification result includes: acquiring a second verification code of the encrypted information; matching the second verification code of the encrypted information with the first verification code to obtain a matching result; and generating a verification result according to the matching result.
In this embodiment, the second verification code refers to unique information for identifying the encrypted information, such as a hash value; if the second verification code of the encrypted information is successfully matched with the first verification code, the encrypted information is not tampered, otherwise, the encrypted information is tampered. The matching result means that the second verification code of the encrypted information is successfully matched with the first verification code, or the second verification code of the encrypted information is unsuccessfully matched with the first verification code; the verification result means that the encrypted information is verified or the encrypted information is not verified.
For example, the server obtains the second verification code of the encrypted information by the above-mentioned manner of obtaining the first verification code of the encrypted information, matches the second verification code of the encrypted information with the first verification code of the encrypted information to obtain a matching result, and generates a verification result according to the matching result; therefore, the encrypted information is verified, the encrypted information is prevented from being tampered, the power construction user information transmitted to the server is safer, and the identification safety of the power construction user information is improved.
In one embodiment, obtaining the second authentication code of the encrypted information comprises: acquiring a preset verification code statistical instruction; and counting the encrypted information according to a preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
In this embodiment, the second verification code refers to unique information for identifying the encrypted information, such as a hash value. If the encrypted information is not tampered, the first verification code and the second verification code of the encrypted information are consistent.
For example, the server obtains a preset hash value counting instruction, counts the hash value of the encrypted information according to the preset hash value counting instruction, and uses the hash value as the second verification code of the encrypted information. Therefore, the encrypted information can be verified subsequently according to the second verification code of the encrypted information, the encrypted information is prevented from being tampered, the power construction user information transmitted to the server is safer, and the identification safety of the power construction user information is further improved.
It should be noted that, in addition to the above manner of obtaining the second verification code of the encrypted information according to the preset verification code statistical instruction, the second verification code of the encrypted information may also be obtained in other manners, which is not described herein again specifically.
In an embodiment, the step S202 of verifying the encrypted information to obtain a verification result further includes: acquiring a network IP address carried by the encrypted information; matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result; and generating a verification result according to the matching result.
The preset network IP address refers to a fixed IP address corresponding to a private network allocated to the access control terminal of the power construction site, and is a network IP address which can be used only after authorization. The matching result means that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, or the network IP address carried by the encrypted information is unsuccessfully matched with the preset network IP address; the verification result means that the encrypted information is verified or the encrypted information is not verified.
For example, the server acquires a preset IP address resolution instruction, and resolves the encrypted information according to the preset IP address resolution instruction to obtain a network IP address carried by the encrypted information; matching the network IP address carried by the encrypted information with a preset network IP address, wherein if the network IP address carried by the encrypted information is successfully matched with the preset network IP address, the encrypted information is sent through the preset network and is not sent through other networks, namely the encrypted information is not tampered; if the matching of the network IP address carried by the encrypted information and the preset network IP address fails, the encrypted information is sent through other networks and is not sent through the preset network, namely the encrypted information is possibly tampered, so that a matching result of the encrypted information is obtained, and a verification result is generated according to the matching result.
In the embodiment, the encrypted information is verified, so that the encrypted information is prevented from being tampered, the power construction user information transmitted to the server is safer, and the identification safety of the power construction user information is improved.
In one embodiment, the step S203, confirming that the encrypted information is verified according to the verification result, includes: extracting a matching result in the verification result; and if the matching result is that the first verification code and the second verification code of the encrypted information are successfully matched, or the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to be passed.
For example, the server acquires the information identifier of the matching result, and extracts the matching result corresponding to the information identifier from the verification result; and analyzing the matching result, and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, or the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to be passed. Through the embodiment, the purpose of confirming whether the encrypted information passes the verification is achieved, the transmission safety of the encrypted information is guaranteed, and the identification safety of the power construction user information is further improved.
In addition, if the matching result is that the second verification code of the encrypted information fails to be matched with the first verification code, or the matching result is that the network IP address carried by the encrypted information fails to be matched with the preset network IP address, the server acquires an alarm instruction, sends the alarm instruction to the electric power construction site access control terminal, and triggers the electric power construction site access control terminal to send out an alarm so as to remind field maintenance personnel that the electric power construction user information is in danger of being tampered, and corresponding protective measures need to be taken in time.
In an embodiment, in step S205, after the generating the identification success information if the power construction user information is successfully matched with the preset power construction user information, the method further includes: acquiring a third key; encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key.
The third key is a parameter for encrypting the identification success information, and may be a symmetric key or an asymmetric key.
Then, in step S205, the step of sending the identification success information to the electric power construction site access control terminal includes: and sending the encrypted identification success information to the electric power construction site access control terminal.
Therefore, the identification success information is encrypted, and the encrypted identification success information is sent to the electric power construction site access control terminal, so that the condition that the identification error information is falsified into the identification success information can be avoided, illegal personnel enter and exit the gate machine, the identification safety of the electric power construction personnel information is further improved, and the safety of the electric power construction site is ensured.
Furthermore, the identification safety of the power construction user information can be guaranteed through other modes. In an embodiment, the step S201 of receiving the encryption information and the key identifier sent by the electric power construction site access control terminal includes: and receiving the encrypted information and the key identification sent by the entrance guard terminal of the power construction site through a preset network channel.
The preset network channel is a dedicated network channel which is distributed to the electric power construction site access control terminal and is communicated with the corresponding server, and the network channel can be used only after authorization.
In this embodiment, the encrypted information and the key identifier sent by the access control terminal of the power construction site are received through the preset network channel, so that the transmission security of the power construction user information can be further ensured, the risk of the power construction user information being invaded is avoided, and the identification security of the power construction user information is improved.
In an embodiment, the step S205 of sending the identification success information to the electric power construction site access control terminal includes: and sending the identification success information to the electric power construction site access control terminal through a preset network channel.
In this embodiment, the successful identification information is sent to the entrance guard terminal of the power construction site through the preset network channel, so that the transmission safety of the successful identification information can be further guaranteed, the defect that the identification safety of the power construction user information is reduced due to the fact that the successful identification information is invaded is avoided, and the identification safety of the power construction user information is improved.
In one embodiment, as shown in fig. 3, another method for identifying power construction user information is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step S301, receiving encrypted information, a secret key identification and a first verification code of the encrypted information sent by an entrance guard terminal of an electric power construction site through a preset network channel; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key.
Step S302, acquiring a second verification code of the encrypted information; matching the second verification code of the encrypted information with the first verification code to obtain a matching result; and generating a verification result according to the matching result.
Step S303, extracting a matching result in the verification result; and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, confirming that the encrypted information is verified to pass.
Step S304, a second key corresponding to the key identification is obtained from a preset key library; the second key matches the first key.
And S305, decrypting the encrypted information according to the second secret key to obtain the power construction user information.
Step S306, if the power construction user information is successfully matched with the preset power construction user information, generating identification success information.
Step S307, acquiring a third key; encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key.
And S308, sending the encrypted identification success information to the electric power construction site access control terminal through a preset network channel.
According to the method for identifying the power construction user information, the purpose of receiving the encrypted information of the power construction user information sent by the access control terminal of the power construction site is achieved, the transmission safety of the power construction user information is ensured, the information is prevented from being tampered, and therefore the identification safety of the power construction user information is improved; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
It should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided an identification apparatus of power construction user information, including: the information receiving module 410, the information verifying module 420, the key obtaining module 430, the information decrypting module 440 and the information sending module 450, wherein:
the information receiving module 410 is used for receiving encrypted information and a key identifier sent by the electric power construction site access control terminal; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key.
And the information verification module 420 is configured to verify the encrypted information to obtain a verification result.
The key obtaining module 430 is configured to confirm that the encrypted information passes the verification according to the verification result, and obtain a second key corresponding to the key identifier from the preset key repository; the second key matches the first key.
And the information decryption module 440 is configured to decrypt the encrypted information according to the second key to obtain the power construction user information.
And the information sending module 450 is configured to generate successful identification information if the power construction user information is successfully matched with preset power construction user information, and send the successful identification information to the power construction site access control terminal.
In one embodiment, the identification apparatus for the electric power construction user information further includes a verification code receiving module, configured to receive a first verification code of the encrypted information sent by the electric power construction site access control terminal before the information verification module 420 verifies the encrypted information to obtain a verification result.
In one embodiment, the information verification module 420 is further configured to obtain a second verification code for the encrypted information; matching the second verification code of the encrypted information with the first verification code to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the information verification module 420 is further configured to obtain a preset verification code statistical instruction; and counting the encrypted information according to a preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
In one embodiment, the information verification module 420 is further configured to obtain a network IP address carried by the encrypted information; matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the key obtaining module 430 is further configured to extract a matching result in the verification result; and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, confirming that the encrypted information is verified to pass.
In one embodiment, the key obtaining module 430 is further configured to extract a matching result in the verification result; and if the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to be passed.
In one embodiment, the identification device for the power construction user information further includes a first information encryption module, configured to obtain a third key after the information sending module 450 generates the identification success information; encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key.
In one embodiment, the information sending module 450 is further configured to send the encrypted identification success information to the electric power construction site access control terminal.
In one embodiment, the information receiving module 410 is further configured to receive, through a preset network channel, encrypted information and a key identifier sent by the electric power construction site access control terminal.
In one embodiment, the information sending module 450 is further configured to send the identification success information to the electric power construction site access control terminal through a preset network channel.
In the embodiments, the identification device for the power construction user information receives the encrypted information and the key identifier sent by the access control terminal of the power construction site, wherein the encrypted information is obtained by encrypting the power construction user information by using a first key by the terminal; verifying the encrypted information to obtain a verification result; according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key; decrypting the encrypted information according to the second key to obtain power construction user information; if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to a power construction site access control terminal; the purpose of receiving the encrypted information of the power construction user information sent by the power construction site access control terminal is achieved, the transmission safety of the power construction user information is guaranteed, the information is prevented from being tampered, and therefore the identification safety of the power construction user information is improved; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
Specific limitations of the identification device of the power construction user information can be referred to the above limitations of the identification method of the power construction user information, and are not described herein again. All or part of each module in the identification device of the power construction user information can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer equipment is used for storing data such as a second secret key and preset power construction user information. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of identifying power construction user information.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key;
decrypting the encrypted information according to the second key to obtain power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and before verifying the encrypted information and obtaining a verification result, receiving a first verification code of the encrypted information sent by the access control terminal of the power construction site.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a second verification code of the encrypted information; matching the second verification code of the encrypted information with the first verification code to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a preset verification code statistical instruction; and counting the encrypted information according to a preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a network IP address carried by the encrypted information; matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the processor, when executing the computer program, further performs the steps of: extracting a matching result in the verification result; and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, confirming that the encrypted information is verified to pass.
In one embodiment, the processor, when executing the computer program, further performs the steps of: extracting a matching result in the verification result; and if the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to be passed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and then acquiring a third secret key; encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and sending the encrypted identification success information to the electric power construction site access control terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and receiving the encrypted information and the key identification sent by the entrance guard terminal of the power construction site through a preset network channel.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and sending the identification success information to the electric power construction site access control terminal through a preset network channel.
In the embodiments, the computer device realizes the purpose of receiving the encrypted information of the power construction user information sent by the power construction site access control terminal through the computer program running on the processor, ensures the transmission security of the power construction user information, and avoids information tampering, thereby improving the identification security of the power construction user information; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encryption information is obtained by encrypting the electric power construction user information by the electric power construction site access control terminal by using a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encryption information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key library; the second key is matched with the first key;
decrypting the encrypted information according to the second key to obtain power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: and before verifying the encrypted information and obtaining a verification result, receiving a first verification code of the encrypted information sent by the access control terminal of the power construction site.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a second verification code of the encrypted information; matching the second verification code of the encrypted information with the first verification code to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a preset verification code statistical instruction; and counting the encrypted information according to a preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a network IP address carried by the encrypted information; matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result; and generating a verification result according to the matching result.
In one embodiment, the computer program when executed by the processor further performs the steps of: extracting a matching result in the verification result; and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, confirming that the encrypted information is verified to pass.
In one embodiment, the computer program when executed by the processor further performs the steps of: extracting a matching result in the verification result; and if the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to be passed.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and then acquiring a third secret key; encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key.
In one embodiment, the computer program when executed by the processor further performs the steps of: and sending the encrypted identification success information to the electric power construction site access control terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: and receiving the encrypted information and the key identification sent by the entrance guard terminal of the power construction site through a preset network channel.
In one embodiment, the computer program when executed by the processor further performs the steps of: and sending the identification success information to the electric power construction site access control terminal through a preset network channel.
In the above embodiments, the computer-readable storage medium implements, through the computer program stored therein, the purpose of receiving the encrypted information of the power construction user information sent by the power construction site access control terminal, ensures the transmission security of the power construction user information, and avoids information being tampered, thereby improving the identification security of the power construction user information; meanwhile, the encrypted information is verified, the encrypted information is prevented from being tampered, and the identification safety of the power construction user information is further improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for identifying power construction user information is characterized by comprising the following steps:
receiving encrypted information and a key identification sent by an entrance guard terminal of a power construction site; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
verifying the encrypted information to obtain a verification result;
according to the verification result, confirming that the encrypted information passes the verification, and acquiring a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
decrypting the encrypted information according to the second key to obtain the power construction user information;
and if the power construction user information is successfully matched with the preset power construction user information, generating identification success information, and sending the identification success information to the power construction site access control terminal.
2. The method of claim 1, further comprising, before verifying the encrypted information to obtain a verification result:
receiving a first verification code of encrypted information sent by an entrance guard terminal of a power construction site;
the verifying the encrypted information to obtain a verification result includes:
acquiring a second verification code of the encrypted information;
matching the second verification code of the encrypted information with the first verification code to obtain a matching result;
and generating a verification result according to the matching result.
3. The method of claim 2, wherein obtaining the second authentication code of the encrypted information comprises:
acquiring a preset verification code statistical instruction;
and counting the encrypted information according to the preset verification code counting instruction to obtain a verification code of the encrypted information, wherein the verification code is used as a second verification code of the encrypted information.
4. The method of claim 1, wherein the verifying the encrypted information to obtain a verification result further comprises:
acquiring a network IP address carried by the encrypted information;
matching the network IP address carried by the encrypted information with a preset network IP address to obtain a matching result;
and generating a verification result according to the matching result.
5. The method according to claim 3 or 4, wherein the confirming that the encrypted information is verified according to the verification result comprises:
extracting the matching result in the verification result;
and if the matching result is that the second verification code of the encrypted information is successfully matched with the first verification code, or the matching result is that the network IP address carried by the encrypted information is successfully matched with the preset network IP address, confirming that the encrypted information is verified to pass.
6. The method of claim 1, wherein after generating the identification success information if the power construction user information is successfully matched with the preset power construction user information, the method further comprises:
acquiring a third key;
encrypting the identification success information according to the third key to obtain encrypted identification success information; the encrypted identification success information carries the key identification of the third key;
the successful recognition information is sent to the entrance guard terminal of the electric power construction site, and the method comprises the following steps:
and sending the encrypted identification success information to the electric power construction site access control terminal.
7. The method according to any one of claims 1 to 6, wherein the receiving of the encrypted information and the key identification sent by the electric power construction site access control terminal comprises:
receiving encryption information and a key identification sent by an entrance guard terminal of a power construction site through a preset network channel;
and/or the presence of a gas in the gas,
the successful recognition information is sent to the entrance guard terminal of the electric power construction site, and the method comprises the following steps:
and sending the identification success information to the electric power construction site access control terminal through the preset network channel.
8. An identification device for power construction user information, the device comprising:
the information receiving module is used for receiving encrypted information and a key identification which are sent by the electric power construction site access control terminal; the encrypted information is obtained by encrypting electric power construction user information by the electric power construction site access control terminal through a first secret key; the key identification corresponds to the first key;
the information verification module is used for verifying the encrypted information to obtain a verification result;
the key obtaining module is used for confirming that the encrypted information passes the verification according to the verification result and obtaining a second key corresponding to the key identifier from a preset key bank; the second key matches the first key;
the information decryption module is used for decrypting the encrypted information according to the second secret key to obtain the power construction user information;
and the information sending module is used for generating successful identification information if the power construction user information is successfully matched with preset power construction user information, and sending the successful identification information to the power construction site access control terminal.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN201910856915.5A 2019-09-11 2019-09-11 Identification method and device for power construction user information and computer equipment Pending CN110766845A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910856915.5A CN110766845A (en) 2019-09-11 2019-09-11 Identification method and device for power construction user information and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910856915.5A CN110766845A (en) 2019-09-11 2019-09-11 Identification method and device for power construction user information and computer equipment

Publications (1)

Publication Number Publication Date
CN110766845A true CN110766845A (en) 2020-02-07

Family

ID=69329453

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910856915.5A Pending CN110766845A (en) 2019-09-11 2019-09-11 Identification method and device for power construction user information and computer equipment

Country Status (1)

Country Link
CN (1) CN110766845A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112562154A (en) * 2020-11-04 2021-03-26 重庆恢恢信息技术有限公司 Method for guaranteeing safety consciousness of building personnel in smart building site area
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100265038A1 (en) * 2001-07-10 2010-10-21 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
CN102394876A (en) * 2011-10-27 2012-03-28 航天科工深圳(集团)有限公司 System and method for logging in distribution network master station
CN103714599A (en) * 2013-11-25 2014-04-09 南京艾思鸥光电科技有限公司 WLAN-based iris entrance guard system and communication method
CN104683290A (en) * 2013-11-26 2015-06-03 腾讯科技(深圳)有限公司 Method and device for monitoring phishing and terminal
CN107103676A (en) * 2017-06-06 2017-08-29 张永穆 A kind of shared equipment dynamic puzzle-lock system
CN108667601A (en) * 2017-03-31 2018-10-16 华为技术有限公司 A kind of method, apparatus and equipment of transmission data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100265038A1 (en) * 2001-07-10 2010-10-21 American Express Travel Related Services Company, Inc. Method and system for hand geometry recognition biometrics on a fob
CN102394876A (en) * 2011-10-27 2012-03-28 航天科工深圳(集团)有限公司 System and method for logging in distribution network master station
CN103714599A (en) * 2013-11-25 2014-04-09 南京艾思鸥光电科技有限公司 WLAN-based iris entrance guard system and communication method
CN104683290A (en) * 2013-11-26 2015-06-03 腾讯科技(深圳)有限公司 Method and device for monitoring phishing and terminal
CN108667601A (en) * 2017-03-31 2018-10-16 华为技术有限公司 A kind of method, apparatus and equipment of transmission data
CN107103676A (en) * 2017-06-06 2017-08-29 张永穆 A kind of shared equipment dynamic puzzle-lock system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113345130A (en) * 2020-02-18 2021-09-03 佛山市云米电器科技有限公司 Control method of intelligent door, intelligent door and computer readable storage medium
CN112562154A (en) * 2020-11-04 2021-03-26 重庆恢恢信息技术有限公司 Method for guaranteeing safety consciousness of building personnel in smart building site area
CN112562154B (en) * 2020-11-04 2022-08-26 重庆恢恢信息技术有限公司 Method for guaranteeing safety consciousness of building personnel in smart building site area

Similar Documents

Publication Publication Date Title
CN108306876B (en) Client identity authentication method, device, computer equipment and storage medium
CN106612180B (en) Method and device for realizing session identification synchronization
CN111031047B (en) Device communication method, device, computer device and storage medium
US9218473B2 (en) Creation and authentication of biometric information
CN111010367A (en) Data storage method and device, computer equipment and storage medium
CN109347813B (en) Internet of things equipment login method and system, computer equipment and storage medium
CN112565265B (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN104636680A (en) Verification of authenticity of a maintenance means and provision and obtainment of a license key for use therein
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
KR20180019179A (en) Authentication system
CN105099705A (en) Safety communication method and system based on USB protocol
CN109462572B (en) Multi-factor authentication method, system, storage medium and security gateway based on encryption card and UsbKey
CN111585995B (en) Secure wind control information transmission and processing method and device, computer equipment and storage medium
CN110766845A (en) Identification method and device for power construction user information and computer equipment
CN110311783B (en) User attribution verification method and device based on group signature and computer equipment
CN112836206A (en) Login method, device, storage medium and computer equipment
CN111654378B (en) Data security self-checking method based on electric power security gateway
CN110445774B (en) Security protection method, device and equipment for IoT (Internet of things) equipment
CN112383577A (en) Authorization method, device, system, equipment and storage medium
CN112910883B (en) Data transmission method and device and electronic equipment
CN114422266A (en) IDaaS system based on dual verification mechanism
CN114239000A (en) Password processing method, device, computer equipment and storage medium
CN113868628A (en) Signature verification method and device, computer equipment and storage medium
CN115114648A (en) Data processing method and device and electronic equipment
CN112507313A (en) Fingerprint verification method, chip and intelligent door lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200207

RJ01 Rejection of invention patent application after publication