CN113378189A - Authentication and verification method and system for load identification module - Google Patents
Authentication and verification method and system for load identification module Download PDFInfo
- Publication number
- CN113378189A CN113378189A CN202110601381.9A CN202110601381A CN113378189A CN 113378189 A CN113378189 A CN 113378189A CN 202110601381 A CN202110601381 A CN 202110601381A CN 113378189 A CN113378189 A CN 113378189A
- Authority
- CN
- China
- Prior art keywords
- data
- identification module
- check code
- software
- load identification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 62
- 238000000034 method Methods 0.000 title claims abstract description 33
- 238000004364 calculation method Methods 0.000 claims abstract description 38
- 238000009826 distribution Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 10
- 238000004590 computer program Methods 0.000 description 7
- 238000004422 calculation algorithm Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an authentication and verification method and system for a load identification module, which comprises the following steps: the checker sends the software identification inquiry message of the inquiry module to the target load identification module and receives the software identification data fed back by the target load identification module; the checking party sends a dynamic check code inquiry message of the inquiry module to the target load identification module, and receives a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption mode; the verifier carries out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode to obtain a second dynamic check code; and the verifier compares the first dynamic check code with the second dynamic check code and determines that the target load identification module passes the legal authentication check when the comparison result indicates that the first dynamic check code is consistent with the second dynamic check code.
Description
Technical Field
The present invention relates to the field of authentication and verification technologies, and in particular, to an authentication and verification method and system for a load identification module.
Background
The new generation of the IOT table supports a plurality of module slots, wherein one module is used for identifying load characteristics so as to optimize user experience and electricity utilization safety. In order to enhance the universality and stability of hardware, a unified hardware platform is provided for a power grid, products with the same hardware specification are used by various manufacturers, the universality of the hardware is ensured, and load identification software and algorithms are developed on the basis of the hardware. At present, hardware access equipment needs to be managed and controlled, and unauthorized hardware equipment is prevented from accessing the network, so that the running stability of the whole power grid equipment is influenced.
Therefore, an authentication and verification method for a load identification module is needed.
Disclosure of Invention
The invention provides an authentication and verification method and system for a load identification module, which aim to solve the problem of accurately and efficiently authenticating and verifying the load identification module.
In order to solve the above problem, according to an aspect of the present invention, there is provided an authentication verification method for a load identification module, the method including:
the checking party sends a software identification query message of the query module to the target load identification module and receives software identification data fed back by the target load identification module according to the software identification query message;
the checking party sends a dynamic check code inquiry message of the inquiry module to the target load identification module, and receives a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption mode;
the verifier carries out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode to obtain a second dynamic check code;
and the verifier compares the first dynamic check code with the second dynamic check code and determines that the target load identification module passes the legal authentication check when the comparison result indicates that the first dynamic check code is consistent with the second dynamic check code.
Preferably, the software identification data comprises: software production number, software delivery version number and serial number.
Preferably, the performing encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner includes:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
Preferably, wherein the method further comprises:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
Preferably, wherein the method further comprises:
before authentication and verification, a verifier distributes a private key to a load identification module so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
According to another aspect of the present invention, there is provided an authentication verification system for a load identification module, the system comprising:
the first query message sending unit is used for enabling the checking party to send a software identification query message of the query module to the target load identification module and receiving software identification data fed back by the target load identification module according to the software identification query message;
the second query message sending unit is used for enabling the verifier to send a dynamic check code query message of the query module to the target load identification module and receiving a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption mode;
the second dynamic check code calculating unit is used for enabling the checking party to carry out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode so as to obtain a second dynamic check code;
and the authentication and verification unit is used for enabling a verifier to compare the first dynamic verification code with the second dynamic verification code and determining that the target load identification module passes the authentication and verification of the legality when the comparison result indicates that the first dynamic verification code is consistent with the second dynamic verification code.
Preferably, the software identification data comprises: software production number, software delivery version number and serial number.
Preferably, the target load identification module and the second dynamic verification code calculation unit perform encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner, and include:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
Preferably, wherein the system further comprises:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
Preferably, wherein the system further comprises:
the private key distribution unit is used for enabling the verifier to distribute the private key to the load identification module before authentication and verification so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
The invention provides an authentication and verification method and system for a load identification module, which comprises the following steps: the verifier and the load identification module respectively carry out encryption calculation according to the software identification data and the timestamp data of the load identification module to obtain a dynamic check code, and the dynamic check codes of the verifier and the load identification module are compared with the second dynamic check code to carry out authentication and check on the legality of the load identification module; the encryption algorithm of the invention is complex, and illegal hardware can not encrypt under the condition that software identification data or private key can not be known, so legal network access can not be carried out, and the safety coefficient of authentication and verification is increased.
Drawings
A more complete understanding of exemplary embodiments of the present invention may be had by reference to the following drawings in which:
FIG. 1 is a flowchart of an authentication verification method 100 for a load identification module according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of an authentication verification system 200 for load identification modules according to an embodiment of the present invention.
Detailed Description
The exemplary embodiments of the present invention will now be described with reference to the accompanying drawings, however, the present invention may be embodied in many different forms and is not limited to the embodiments described herein, which are provided for complete and complete disclosure of the present invention and to fully convey the scope of the present invention to those skilled in the art. The terminology used in the exemplary embodiments illustrated in the accompanying drawings is not intended to be limiting of the invention. In the drawings, the same units/elements are denoted by the same reference numerals.
Unless otherwise defined, terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. Further, it will be understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense.
Fig. 1 is a flowchart of an authentication verification method 100 for a load identification module according to an embodiment of the invention. As shown in fig. 1, the authentication and verification method for a load identification module according to the embodiment of the present invention has a complex encryption algorithm, and when an illegal hardware cannot obtain software identification data or a private key, the illegal hardware cannot perform encryption, so that legal network access cannot be performed, and the security coefficient of authentication and verification is increased. In the authentication and verification method 100 for a load identification module according to the embodiment of the present invention, starting from step 101, a verifying party sends a software identifier query message of a query module to a target load identification module in step 101, and receives software identifier data fed back by the target load identification module according to the software identifier query message.
Preferably, the software identification data comprises: software production number, software delivery version number and serial number.
In the invention, the checking party can be a system master station or an electric energy meter, and the checking party initiates a software identification query message for querying the load identification module to the target load identification module and receives software identification data fed back by the target load identification module.
In the present invention, the software identification data includes: the software production number, the software factory version number and the serial number are 16 bits in total. The modules of each legal module manufacturer have unique software production numbers, and unique software identifiers are formed by adding software version numbers and production serial numbers, wherein the software identifiers are shown in table 1.
TABLE 1 software identification composition table
In step 102, the verifier sends a dynamic check code query message of the query module to the target load identification module, and receives a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner.
In step 103, the verifier performs encryption calculation according to the received software identification data and the current timestamp data in a preset encryption manner to obtain a second dynamic check code.
Preferably, the performing encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner includes:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
Preferably, wherein the method further comprises:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
Preferably, wherein the method further comprises:
before authentication and verification, a verifier distributes a private key to a load identification module so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
In the invention, the checking party initiates a dynamic check code query message of the query module and receives a first dynamic check code fed back by the target load identification module. The first dynamic check code is obtained by encrypting and calculating the target load identification module according to the software identification data of the target load identification module and the current timestamp data in a preset encryption mode.
Specifically, the process that the target load identification module carries out encryption calculation according to software identification data and current timestamp data of the target load identification module and a preset encryption mode to obtain a first dynamic check code comprises the following steps: connecting the software identification data with the current timestamp data to determine plaintext data; multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data; adding each byte code in the first encrypted data to obtain second encrypted data; and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation. And if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0. In addition, before the authentication and the verification, the verifier distributes the private key to the load identification module so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
For example, the software identification of a company's module is: 0001001000000001, the private key is: 1111111111111111, when the current time is 12 months, 21 days 09. The whole calculation flow is shown in table 2.
TABLE 2 dynamic check code calculation process table
Wherein, the partial data in table 1 mean: number of bytes (16 software identifiers, 6 times); software identification + time (0001001000000001+ 122109); a private key (1111111111111111111111); first encrypted data (software identification + time multiplied by the private encryption code corresponding bit); second encrypted data (all first encrypted data results added); dynamic check code (take the second last digit of the second encrypted data, if the second encrypted data <10, then the dynamic check code is 0). The private key is a unique key possessed by each load identification algorithm, is distributed for the verifier, is only public for the verifier and the user, and is unknown to other third parties. The generation of the dynamic check code is divided into 3 steps, including: the first step is as follows: multiplying 22 bytes of data consisting of the software identification of 16 bytes and the time stamp of 6 bytes by corresponding byte bits of the private key of 22 bytes; the second step is that: adding 22 data generated by the first encrypted data to obtain a result; the third step: and taking the ten digits of the second encrypted data as the dynamic check code. Wherein, if the result obtained in the second step is less than 10, the tens number is 0.
Specifically, the table includes a first action of total number of bytes, 16-byte software identifier, 6-byte time, and a second action of 16-byte software identifier 0001001000000001 and 6-byte time 122109, i.e., light green part and blue part, respectively, which will be referred to as identification codes hereinafter. The third behavior is a 16 byte factory private password 1111111111111111111. The first step of encryption is to multiply the 16-byte identifier of the second row by the corresponding bit of the vendor private key of the third row, i.e., the 1 st byte identifier by the 1 st byte private key, until the 16 th byte identifier by the 16 th byte private key, the result is 0001001000000001122109 in the fourth row of the table. The second step of encryption is to sum the 16 byte results obtained in the first step, i.e. the 1 st bit plus the 2 nd bit plus the 3 rd bit until the 16 th bit, to obtain a sum result of 18. The final step of encryption is to take the ten digits of the 10-system sum result of the last step, namely 1 in 18, which is the result of the verification algorithm.
In the invention, the byte check result generated by the load identification module is the first dynamic check code, and the first dynamic check code is replied to the checking party (the system master station or the electric energy meter), so that the checking party (the system master station or the electric energy meter) compares the result with the second dynamic check code calculated by the checking party (the system master station or the electric energy meter) for checking.
The following description is required in the process: the software identification is plaintext and can be read by any equipment; the private key is a cipher text, the device layer stores the unique encryption code, and the verifying party stores all distributed private encryption codes so as to ensure the correct identification of one encryption code; in the interaction process of the detection party, the detection party records the unique software identifier of the hardware while removing the legality of the authentication hardware. Therefore, the legality and uniqueness of the modular combination in the detection system are verified; the time identification can be expanded to 3 months and 30 days in 2021 as 08: 34: 37 can be converted into 20210330083437 to increase the dynamicity and complexity of the encryption code by customizing options of time format, length, number of bits and the like; the calculation method of the first encrypted data and the second encrypted data may also be customized.
In the invention, the verifier carries out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode at the same time so as to obtain the second dynamic verification code. Specifically, the manner of acquiring the second dynamic check code is the same as the manner of acquiring the first dynamic check code by the target load identification module, and is not described herein again.
In step 104, the verifier compares the first dynamic verification code with the second dynamic verification code, and determines that the target load identification module passes the authentication verification of validity when the comparison result indicates that the first dynamic verification code is consistent with the second dynamic verification code.
In the invention, when a verifier calculates to obtain a second dynamic check code and receives a first dynamic check code, the first dynamic check code and the second dynamic check code are compared, and when a comparison result indicates that the first dynamic check code and the second dynamic check code are consistent, the target load identification module is determined to pass the legal authentication check. After the dynamic verification method is used, if the target load identification module is determined to be illegal hardware equipment, the illegal hardware equipment cannot carry out normal service communication with a verifier (a system master station or an electric energy meter).
The dynamic verification encryption algorithm performs encryption calculation by combining a plurality of elements such as company private passwords, company manufacturer codes, hardware delivery serial numbers and software version numbers, so that the encryption complexity is extremely high, and illegal hardware cannot perform encryption and cannot perform legal network access under the condition that any one element cannot be known. By the dynamic verification mode, the safety factor of the verification is greatly increased. Making it more difficult to break the password.
Fig. 2 is a schematic structural diagram of an authentication verification system 200 for load identification modules according to an embodiment of the present invention. As shown in fig. 2, an authentication verification system 200 for load identification modules according to an embodiment of the present invention includes: a first query message sending unit 201, a second query message sending unit 202, a second dynamic check code calculating unit 203 and an authentication checking unit 204.
Preferably, the first query packet sending unit 201 is configured to enable the verifier to send a software identifier query packet of the query module to the target load identification module, and receive software identifier data fed back by the target load identification module according to the software identifier query packet.
Preferably, the software identification data comprises: software production number, software delivery version number and serial number.
Preferably, the second query message sending unit 202 is configured to enable the verifier to send a dynamic check code query message of the query module to the target load identification module, and receive the first dynamic check code obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner.
Preferably, the second dynamic check code calculating unit 203 is configured to enable the verifier to perform encryption calculation according to the received software identification data and the current timestamp data in a preset encryption manner, so as to obtain the second dynamic check code.
Preferably, the target load identification module and the second dynamic verification code calculation unit 203 perform encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner, including:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
Preferably, wherein the system further comprises:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
Preferably, wherein the system further comprises:
the private key distribution unit is used for enabling the verifier to distribute the private key to the load identification module before authentication and verification so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
Preferably, the authentication and verification unit 204 is configured to enable a verifier to compare the first dynamic verification code with the second dynamic verification code, and determine that the target load identification module passes the legal authentication and verification when the comparison result indicates that the first dynamic verification code is consistent with the second dynamic verification code.
The authentication verification system 200 for load identification module according to the embodiment of the present invention corresponds to the authentication verification method 100 for load identification module according to another embodiment of the present invention, and is not described herein again.
The invention has been described with reference to a few embodiments. However, other embodiments of the invention than the one disclosed above are equally possible within the scope of the invention, as would be apparent to a person skilled in the art from the appended patent claims.
Generally, all terms used in the claims are to be interpreted according to their ordinary meaning in the technical field, unless explicitly defined otherwise herein. All references to "a/an/the [ device, component, etc ]" are to be interpreted openly as referring to at least one instance of said device, component, etc., unless explicitly stated otherwise. The steps of any method disclosed herein do not have to be performed in the exact order disclosed, unless explicitly stated.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting the same, and although the present invention is described in detail with reference to the above embodiments, those of ordinary skill in the art should understand that: modifications and equivalents may be made to the embodiments of the invention without departing from the spirit and scope of the invention, which is to be covered by the claims.
Claims (10)
1. An authentication and verification method for a load identification module, the method comprising:
the checking party sends a software identification query message of the query module to the target load identification module and receives software identification data fed back by the target load identification module according to the software identification query message;
the checking party sends a dynamic check code inquiry message of the inquiry module to the target load identification module, and receives a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption mode;
the verifier carries out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode to obtain a second dynamic check code;
and the verifier compares the first dynamic check code with the second dynamic check code and determines that the target load identification module passes the legal authentication check when the comparison result indicates that the first dynamic check code is consistent with the second dynamic check code.
2. The method of claim 1, wherein the software identification data comprises: software production number, software delivery version number and serial number.
3. The method according to claim 1, wherein the performing encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner comprises:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
4. The method of claim 3, further comprising:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
5. The method of claim 1, further comprising:
before authentication and verification, a verifier distributes a private key to a load identification module so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
6. An authentication and verification system for a load identification module, the system comprising:
the first query message sending unit is used for enabling the checking party to send a software identification query message of the query module to the target load identification module and receiving software identification data fed back by the target load identification module according to the software identification query message;
the second query message sending unit is used for enabling the verifier to send a dynamic check code query message of the query module to the target load identification module and receiving a first dynamic check code which is obtained and fed back by the target load identification module through encryption calculation according to the software identification data and the current timestamp data in a preset encryption mode;
the second dynamic check code calculating unit is used for enabling the checking party to carry out encryption calculation according to the received software identification data and the current timestamp data in a preset encryption mode so as to obtain a second dynamic check code;
and the authentication and verification unit is used for enabling a verifier to compare the first dynamic verification code with the second dynamic verification code and determining that the target load identification module passes the authentication and verification of the legality when the comparison result indicates that the first dynamic verification code is consistent with the second dynamic verification code.
7. The system of claim 6, wherein the software identification data comprises: software production number, software delivery version number and serial number.
8. The system according to claim 6, wherein the target load identification module and the second dynamic verification code calculation unit perform encryption calculation according to the software identification data and the current timestamp data in a preset encryption manner, and the encryption calculation includes:
connecting the software identification data with the current timestamp data to determine plaintext data;
multiplying each byte code in the plaintext data with a byte code of a corresponding byte in the private key respectively according to a byte sequence to obtain first encrypted data;
adding each byte code in the first encrypted data to obtain second encrypted data;
and taking the last but one bit of the second encrypted data as a dynamic check code obtained through encryption calculation.
9. The system of claim 8, further comprising:
and if the penultimate bit of the second encrypted data is null, determining that the dynamic check code is 0.
10. The system of claim 6, further comprising:
the private key distribution unit is used for enabling the verifier to distribute the private key to the load identification module before authentication and verification so that the load identification module receives and stores the private key; the load identification module and the private key are in one-to-one correspondence.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110601381.9A CN113378189A (en) | 2021-05-31 | 2021-05-31 | Authentication and verification method and system for load identification module |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110601381.9A CN113378189A (en) | 2021-05-31 | 2021-05-31 | Authentication and verification method and system for load identification module |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113378189A true CN113378189A (en) | 2021-09-10 |
Family
ID=77575185
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110601381.9A Pending CN113378189A (en) | 2021-05-31 | 2021-05-31 | Authentication and verification method and system for load identification module |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113378189A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116094764A (en) * | 2022-12-07 | 2023-05-09 | 南方电网数字电网研究院有限公司 | Power grid data storage method, device and equipment of power monitoring system |
CN116382740A (en) * | 2023-04-10 | 2023-07-04 | 广州锦高信息科技有限公司 | Automatic upgrade release system and method for application software |
-
2021
- 2021-05-31 CN CN202110601381.9A patent/CN113378189A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116094764A (en) * | 2022-12-07 | 2023-05-09 | 南方电网数字电网研究院有限公司 | Power grid data storage method, device and equipment of power monitoring system |
CN116094764B (en) * | 2022-12-07 | 2024-06-04 | 南方电网数字电网研究院有限公司 | Power grid data storage method, device and equipment of power monitoring system |
CN116382740A (en) * | 2023-04-10 | 2023-07-04 | 广州锦高信息科技有限公司 | Automatic upgrade release system and method for application software |
CN116382740B (en) * | 2023-04-10 | 2023-11-14 | 广州锦高信息科技有限公司 | Automatic upgrade release system and method for application software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112789824B (en) | Block chain system, information transmission method, system, device and computer medium | |
CN108646983B (en) | Processing method and device for storing service data on block chain | |
US20170063537A1 (en) | Method, device, and system of provisioning cryptographic data to electronic devices | |
CN110463237A (en) | Method for the communication between management server and user equipment | |
CN100512201C (en) | Method for dealing inserted-requested message of business in groups | |
CN108616504B (en) | Sensor node identity authentication system and method based on Internet of things | |
CN101926188B (en) | Security policy distribution to communication terminal | |
US8645693B2 (en) | Zero-knowledge based authentication method, system, and apparatus | |
US20060013400A1 (en) | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |
CN113378189A (en) | Authentication and verification method and system for load identification module | |
CN104868998B (en) | A kind of system, apparatus and method that encryption data is supplied to electronic equipment | |
CN108768635A (en) | A kind of cipher mark administrative model and method suitable for Internet of things system | |
CN115001717B (en) | Terminal equipment authentication method and system based on identification public key | |
CN105553667A (en) | Dynamic password generating method | |
CN108965824B (en) | Video monitoring method and system based on CPK, camera, server and client | |
CN105610872B (en) | Internet-of-things terminal encryption method and internet-of-things terminal encryption device | |
CN114040401B (en) | Terminal authentication method and system | |
CN113591103B (en) | Identity authentication method and system between intelligent terminals of electric power Internet of things | |
CN104735064A (en) | Safety revocation and updating method for identification in identification password system | |
CN112583594B (en) | Data processing method, acquisition device, gateway, trusted platform and storage medium | |
CN109302286B (en) | Fido equipment key index generation method | |
CN107968764A (en) | A kind of authentication method and device | |
CN116633533A (en) | Key generation method, device and equipment for KMS (KMS) system key encryption | |
CN116155483A (en) | Block chain signing machine safety design method and signing machine | |
CN114726609A (en) | Encrypted data verification method and device based on block chain and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |