CN114286331A - Identity authentication method and system suitable for 5G data terminal of power Internet of things - Google Patents

Identity authentication method and system suitable for 5G data terminal of power Internet of things Download PDF

Info

Publication number
CN114286331A
CN114286331A CN202111468094.1A CN202111468094A CN114286331A CN 114286331 A CN114286331 A CN 114286331A CN 202111468094 A CN202111468094 A CN 202111468094A CN 114286331 A CN114286331 A CN 114286331A
Authority
CN
China
Prior art keywords
attribute
information
data terminal
module
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111468094.1A
Other languages
Chinese (zh)
Other versions
CN114286331B (en
Inventor
潘媚媚
王栋
朱拓夫
方念
韩寅峰
朱健
徐腾飞
孙来文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Original Assignee
Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd filed Critical Ningbo Power Supply Co of State Grid Zhejiang Electric Power Co Ltd
Priority to CN202111468094.1A priority Critical patent/CN114286331B/en
Publication of CN114286331A publication Critical patent/CN114286331A/en
Application granted granted Critical
Publication of CN114286331B publication Critical patent/CN114286331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things, which comprises the following steps: s1, sequentially establishing network connection between the management terminal and the 5G data terminals by an identity mutual-recognition principle; s2, 5G data terminal sends request information to management terminal; s3, after the identity credibility of the 5G data terminal is verified by the management terminal, issuing response information and sending the response information to the 5G data terminal; the 5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; the 5G data terminal comprises a second encryption module and a second decryption module. And establishing network security connection with the management terminal through identity authentication of the 5G data terminal, and ensuring security and confidentiality of data interaction through an encryption and decryption algorithm.

Description

Identity authentication method and system suitable for 5G data terminal of power Internet of things
Technical Field
The invention relates to the technical field of information security transmission, in particular to an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things.
Background
At present, various service systems widely adopted by national grid companies, such as safety production, marketing, emergency command, material management, mobile office and the like, adopt intelligent mobile terminals, mainly including notebooks and PDAs. The security threat of the system is mainly in multiple aspects such as physical security, operating system security, storage security, application security and the like. Once the intelligent mobile terminal accessing the information intranet is invaded, lost or illegally used, a large amount of sensitive data stored on the terminal can be revealed, and huge threats can be caused to the safety of the information intranet. The traditional access authentication system generally adopts a user name/password mode for authentication, the security intensity of the mode is low, once an account is stolen, a large amount of sensitive information is completely exposed to illegal access, and therefore a set of complete authentication system needs to be designed to ensure the validity security of the terminal identity. Meanwhile, due to the complexity of the terminal and the use environment of the terminal, the state of the terminal must be monitored and audited in real time so as to ensure the legal use of the terminal. When the intelligent terminal is accessed to the intranet access service system, a large amount of service data information interaction is performed with the intranet machine, if malicious invasion and damage events occur in the interaction process, leakage of key information can be caused, and even wrong service information is received and sent, so that the safety of the accessed intelligent terminal needs to be monitored in real time to ensure that the terminal connected with the intranet is safe and legal all the time. The information network of the mobile terminal of the power system adopts a public mobile communication network, and can be divided into GSM/GPRS/EDGE/TD.SCDMA, GSM/GPRS/EDGE/WCDMA, CDMALX/CDMA2000 and the like according to the division of operators. The public mobile communication networks are physically connected with the Internet at the outside, and lack high-strength data encryption protection, and the serious risk of interception and stealing is faced when data transmission is carried out through a public gateway network. After the mobile terminal is accessed to the information network of the national power grid company, information interaction with various information systems in the information network is needed, most of the information belongs to sensitive information, and high-strength encryption protection is needed. After the information system is damaged, serious damage can be caused to social order and public benefits, or national safety is damaged, and the information system is strictly protected according to relevant national management regulations and technical standards. Therefore, it is imperative to design a method and a system for authenticating the identity of the 5G data terminal to ensure the security of information interaction between the 5G data terminal and the management terminal.
Disclosure of Invention
The invention aims to design an identity authentication method and an identity authentication system suitable for a 5G data terminal of an electric power Internet of things, wherein network security connection between the identity authentication of the 5G data terminal and a management terminal is established, a special secret key is adopted to encrypt request information and then send the encrypted request information to the management terminal through a network security channel, the management terminal generates corresponding response information and then sends the encrypted response information to the 5G data terminal for decryption, and the security and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain can be ensured.
In order to achieve the technical purpose, the invention provides a technical scheme that the identity authentication method suitable for the electric power internet of things 5G data terminal comprises the following steps:
s1, sequentially establishing network connection between the management terminal and the 5G data terminals by an identity mutual-recognition principle;
s2, 5G data terminal sends request information to management terminal;
and S3, after the identity credibility of the 5G data terminal is verified by the management terminal, issuing response information and sending the response information to the 5G data terminal.
Preferably, S1 includes the steps of:
s11, the management terminal comprises an attribute management module, an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises attribute information of all 5G data terminals in the management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends the network connection request information through the common channel management terminal, and the management terminal acquires the ID information corresponding to the 5G data terminal;
s13, according to whether the corresponding ID information exists in the query attribute search table, if so, calling the corresponding network connection protocol for network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal in the full management domain and all 5G data terminals is realized.
Preferably, in S13, the step of acquiring the attribute information corresponding to the 5G data terminal by the attribute expansion module and updating the attribute search table includes the following steps:
s131, when the ID information of the corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first secret key and sends the binary random code to the corresponding 5G data terminal through a public channel, and the first secret key is synchronously stored in the first decryption module;
s132, acquiring a first key corresponding to the 5G data terminal, and sending attribute information of a second encryption module in the 5G data terminal to the management terminal through a public channel after encrypting the attribute information by using the first key;
s133, after the first decryption module in the management terminal decrypts the attribute information, storing the attribute information to the attribute expansion module;
s133, the attribute expansion module applies for the attribute expansion position from the attribute management module, adds the newly acquired attribute information and the corresponding binary random code to the attribute expansion position, and synchronously updates the attribute retrieval table.
Preferably, S2 includes the steps of:
s21, after the 5G data terminal establishes network security communication with the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the pseudo request information block and sends the pseudo request information block to the management terminal;
s22, the management terminal verifies the pseudo request information after acquiring the pseudo request information, acquires an attribute storage bit corresponding to the 5G data terminal after the verification is successful, and sends the binary random code on the attribute storage bit to the corresponding 5G data terminal;
and S23 and the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs through a private key of the request information block, and sends the request information block to the management terminal.
Preferably, S3 includes the steps of:
s31, the management terminal performs signature authentication on the acquired request information block to find out the corresponding attribute storage bit, and the decryption module calls the binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through a public key corresponding to the 5G data terminal and then sends the encrypted response information to the corresponding 5G data terminal;
and S33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal and executes the relevant instruction.
A5G data terminal identity authentication system comprises a management terminal and a plurality of 5G data terminals in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; an attribute retrieval table is established in the attribute management module, the attribute retrieval table contains attribute information of all 5G data terminals in a management domain, and a random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first secret key and is distributed to a 5G data terminal for encrypting the attribute information of the binary random code; the first encryption module is used for encrypting the first secret key by adopting a public key corresponding to the 5G data terminal and then sending the encrypted first secret key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information of the second encryption module by adopting the first secret key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting a private key of the second decryption module.
Preferably, the attribute information includes public key information, ID information, and a network connection protocol.
The invention has the beneficial effects that: the invention designs an identity authentication method and system suitable for a 5G data terminal of an electric power Internet of things, which comprises the steps of firstly authenticating the identity of the 5G data terminal, establishing network security connection with a management terminal after authentication is completed, acquiring a secret key from the management terminal to encrypt request information, sending the request information to the management terminal through a network security channel for decryption, generating corresponding response information by the management terminal, encrypting the response information, sending the response information to the 5G data terminal for decryption, and ensuring the security and confidentiality of data interaction between the 5G data terminal and the management terminal in a management domain.
Drawings
Fig. 1 is a flowchart of an identity authentication method applicable to a 5G data terminal of an electric power internet of things.
Fig. 2 is a schematic structural diagram of a 5G data terminal identity authentication system according to the present invention.
The notation in the figure is: the system comprises a 1-5G data terminal, a 2-management terminal, a 11-second encryption module, a 12-second decryption module, a 21-attribute management module, a 22-random number distribution module, a 23-first encryption module, a 24-first decryption module, a 25-attribute expansion module and a 26-instruction response module.
Detailed Description
For the purpose of better understanding the objects, technical solutions and advantages of the present invention, the following detailed description of the present invention with reference to the accompanying drawings and examples should be understood that the specific embodiment described herein is only a preferred embodiment of the present invention, and is only used for explaining the present invention, and not for limiting the scope of the present invention, and all other embodiments obtained by a person of ordinary skill in the art without making creative efforts shall fall within the scope of the present invention.
Example (b):
as shown in fig. 2, a 5G data terminal identity authentication system is composed of a management terminal 2 and a plurality of 5G data terminals 1 which are in communication connection with the management terminal; the management terminal comprises an attribute management module 21, a random number distribution module 22, a first encryption module 23, a first decryption module 24, an attribute expansion module 25 and an instruction response module 26; an attribute retrieval table is established in the attribute management module, the attribute retrieval table contains attribute information of all 5G data terminals in a management domain, and a random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first secret key and distributed to the 5G data terminal for encrypting the attribute information of the 5G data terminal; the first encryption module is used for encrypting the first secret key by adopting a public key corresponding to the 5G data terminal and then sending the encrypted first secret key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the attribute information comprises public key information, ID information and a network connection protocol; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module 11 and a second decryption module 12; the second encryption module encrypts the attribute information of the second encryption module by adopting the first secret key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting a private key of the second decryption module.
As shown in fig. 1, the identity authentication method suitable for the electric power internet of things 5G data terminal includes the following steps:
and S1, the management terminal and the 5G data terminals sequentially establish network connection through the identity mutual-recognition principle.
S1 includes the following substeps:
s11, the management terminal comprises an attribute management module, an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises attribute information of all 5G data terminals in the management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends the network connection request information through the common channel management terminal, and the management terminal acquires the ID information corresponding to the 5G data terminal;
s13, according to whether the corresponding ID information exists in the query attribute search table, if so, calling the corresponding network connection protocol for network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
the attribute information corresponding to the 5G data terminal is acquired through the attribute expansion module, and the updating of the attribute retrieval table comprises the following substeps:
s131, when the ID information of the corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first secret key and sends the binary random code to the corresponding 5G data terminal through a public channel, and the first secret key is synchronously stored in the first decryption module;
s132, acquiring a first key corresponding to the 5G data terminal, and sending attribute information of a second encryption module in the 5G data terminal to the management terminal through a public channel after encrypting the attribute information by using the first key;
s133, after the first decryption module in the management terminal decrypts the attribute information, storing the attribute information to the attribute expansion module;
s133, the attribute expansion module applies for an attribute expansion position from the attribute management module, adds the newly acquired attribute information and the corresponding binary random code to the attribute expansion position, and synchronously updates the attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal in the full management domain and all 5G data terminals is realized.
The S2, 5G data terminal sends request information to the management terminal.
S2 includes the following substeps:
s21, after the 5G data terminal establishes network security communication with the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the pseudo request information block and sends the pseudo request information block to the management terminal;
s22, the management terminal verifies the pseudo request information after acquiring the pseudo request information, acquires an attribute storage bit corresponding to the 5G data terminal after the verification is successful, and sends the binary random code on the attribute storage bit to the corresponding 5G data terminal;
and S23 and the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs through a private key of the request information block, and sends the request information block to the management terminal.
And S3, after the identity credibility of the 5G data terminal is verified by the management terminal, issuing response information and sending the response information to the 5G data terminal.
S3 includes the following substeps:
s31, the management terminal performs signature authentication on the acquired request information block to find out the corresponding attribute storage bit, and the decryption module calls the binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through a public key corresponding to the 5G data terminal and then sends the encrypted response information to the corresponding 5G data terminal;
and S33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal and executes the relevant instruction.
The above-mentioned embodiments are preferred embodiments of the identity authentication method and system applicable to the 5G data terminal of the power internet of things, and the scope of the present invention is not limited thereto, and all equivalent changes made according to the shape and structure of the present invention are within the protection scope of the present invention.

Claims (7)

1. The identity authentication method suitable for the electric power Internet of things 5G data terminal is characterized by comprising the following steps:
s1, sequentially establishing network connection between the management terminal and the 5G data terminals by an identity mutual-recognition principle;
s2, 5G data terminal sends request information to management terminal;
and S3, after the identity credibility of the 5G data terminal is verified by the management terminal, issuing response information and sending the response information to the 5G data terminal.
2. The identity authentication method applicable to the 5G data terminal of the power Internet of things as claimed in claim 1, wherein S1 comprises the following steps:
s11, the management terminal comprises an attribute management module, an attribute retrieval table is established in the attribute management module, the attribute retrieval table comprises attribute information of all 5G data terminals in the management domain, and the attribute information comprises public key information, ID information and a network connection protocol; the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table;
s12, the 5G data terminal sends the network connection request information through the common channel management terminal, and the management terminal acquires the ID information corresponding to the 5G data terminal;
s13, according to whether the corresponding ID information exists in the query attribute search table, if so, calling the corresponding network connection protocol for network connection; if the attribute information does not exist, acquiring the attribute information corresponding to the 5G data terminal through an attribute expansion module, and updating an attribute retrieval table;
and S14, according to S11-S13, network connection between the management terminal in the full management domain and all 5G data terminals is realized.
3. The identity authentication method applicable to the 5G data terminal of the power Internet of things as claimed in claim 2, wherein in S13, the attribute information corresponding to the 5G data terminal is acquired through the attribute expansion module, and the updating of the attribute search table comprises the following steps:
s131, when the ID information of the corresponding 5G data terminal is not searched in the attribute search table, the random number distribution module generates a binary random code as a first secret key and sends the binary random code to the corresponding 5G data terminal through a public channel, and the first secret key is synchronously stored in the first decryption module;
s132, acquiring a first key corresponding to the 5G data terminal, and sending attribute information of a second encryption module in the 5G data terminal to the management terminal through a public channel after encrypting the attribute information by using the first key;
s133, after the first decryption module in the management terminal decrypts the attribute information, storing the attribute information to the attribute expansion module;
s133, the attribute expansion module applies for the attribute expansion position from the attribute management module, adds the newly acquired attribute information and the corresponding binary random code to the attribute expansion position, and synchronously updates the attribute retrieval table.
4. The identity authentication method applicable to the 5G data terminal of the power Internet of things as claimed in claim 2 or 3, wherein S2 comprises the following steps:
s21, after the 5G data terminal establishes network security communication with the management terminal, the 5G data terminal generates a pseudo request information block, signs the pseudo request information through a private key of the pseudo request information block and sends the pseudo request information block to the management terminal;
s22, the management terminal verifies the pseudo request information after acquiring the pseudo request information, acquires an attribute storage bit corresponding to the 5G data terminal after the verification is successful, and sends the binary random code on the attribute storage bit to the corresponding 5G data terminal;
and S23 and the 5G data terminal generates a request information block, encrypts the request information block through the acquired binary random code, signs through a private key of the request information block, and sends the request information block to the management terminal.
5. The identity authentication method applicable to the 5G data terminal of the power Internet of things as claimed in claim 4, wherein S3 comprises the following steps:
s31, the management terminal performs signature authentication on the acquired request information block to find out the corresponding attribute storage bit, and the decryption module calls the binary code on the corresponding attribute storage bit to decrypt the request information block to obtain request information;
s32, the management terminal generates response information according to the request information, encrypts the response information through a public key corresponding to the 5G data terminal and then sends the encrypted response information to the corresponding 5G data terminal;
and S33, the corresponding 5G data terminal decrypts the acquired response information according to the private key of the corresponding 5G data terminal and executes the relevant instruction.
6. A5G data terminal identity authentication system is suitable for the identity authentication method of the 5G data terminal of the power Internet of things according to any one of claims 1 to 5, and is characterized by comprising a management terminal and a plurality of 5G data terminals in communication connection with the management terminal; the management terminal comprises an attribute management module, a random number distribution module, a first encryption module, a first decryption module, an attribute expansion module and an instruction response module; an attribute retrieval table is established in the attribute management module, and the attribute retrieval table contains attribute information of all 5G data terminals in a management domain; the random number distribution module distributes binary random codes to corresponding attribute bits of the attribute retrieval table; the binary random code is used as a first secret key and is distributed to a 5G data terminal for encrypting the attribute information of the binary random code; the first encryption module is used for encrypting the first secret key by adopting a public key corresponding to the 5G data terminal and then sending the encrypted first secret key to the corresponding 5G data terminal; the first decryption module is used for decrypting the attribute information encrypted by the first key; the attribute expansion module is used for updating the attribute retrieval table; the instruction response module is used for generating corresponding response information according to the request information; the 5G data terminal comprises a second encryption module and a second decryption module; the second encryption module encrypts the attribute information of the second encryption module by adopting the first secret key and then sends the encrypted attribute information to the management terminal, and the second decryption module decrypts the acquired response information by adopting a private key of the second decryption module.
7. The system according to claim 6, wherein the attribute information includes public key information, ID information, and network connection protocol.
CN202111468094.1A 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal Active CN114286331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111468094.1A CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111468094.1A CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Publications (2)

Publication Number Publication Date
CN114286331A true CN114286331A (en) 2022-04-05
CN114286331B CN114286331B (en) 2023-09-12

Family

ID=80870762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111468094.1A Active CN114286331B (en) 2021-12-03 2021-12-03 Identity authentication method and system suitable for electric power Internet of things 5G data terminal

Country Status (1)

Country Link
CN (1) CN114286331B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117294539A (en) * 2023-11-27 2023-12-26 广东电网有限责任公司东莞供电局 User terminal credible authentication method, device, equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013134927A1 (en) * 2012-03-13 2013-09-19 华为终端有限公司 Transport layer security-based key delivery method, smart meter reading terminal and server
US20170063554A1 (en) * 2015-08-25 2017-03-02 Alibaba Group Holding Limited Method and device for multi-user cluster identity authentication
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN112272095A (en) * 2020-12-24 2021-01-26 飞天诚信科技股份有限公司 Distributed key distribution method and system for real-time communication
CN112565265A (en) * 2020-12-04 2021-03-26 国网辽宁省电力有限公司沈阳供电公司 Authentication method, authentication system and communication method between terminal devices of Internet of things
CN113079506A (en) * 2020-01-03 2021-07-06 ***通信集团广东有限公司 Network security authentication method, device and equipment
CN113114460A (en) * 2021-06-15 2021-07-13 国网浙江省电力有限公司杭州供电公司 Quantum encryption-based power distribution network information secure transmission method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013134927A1 (en) * 2012-03-13 2013-09-19 华为终端有限公司 Transport layer security-based key delivery method, smart meter reading terminal and server
US20170063554A1 (en) * 2015-08-25 2017-03-02 Alibaba Group Holding Limited Method and device for multi-user cluster identity authentication
CN111372247A (en) * 2019-12-23 2020-07-03 国网天津市电力公司 Terminal secure access method and terminal secure access system based on narrowband Internet of things
CN113079506A (en) * 2020-01-03 2021-07-06 ***通信集团广东有限公司 Network security authentication method, device and equipment
CN112565265A (en) * 2020-12-04 2021-03-26 国网辽宁省电力有限公司沈阳供电公司 Authentication method, authentication system and communication method between terminal devices of Internet of things
CN112272095A (en) * 2020-12-24 2021-01-26 飞天诚信科技股份有限公司 Distributed key distribution method and system for real-time communication
CN113114460A (en) * 2021-06-15 2021-07-13 国网浙江省电力有限公司杭州供电公司 Quantum encryption-based power distribution network information secure transmission method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117294539A (en) * 2023-11-27 2023-12-26 广东电网有限责任公司东莞供电局 User terminal credible authentication method, device, equipment and storage medium
CN117294539B (en) * 2023-11-27 2024-03-19 广东电网有限责任公司东莞供电局 User terminal credible authentication method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114286331B (en) 2023-09-12

Similar Documents

Publication Publication Date Title
CN105139499A (en) Mobile phone door lock system based on asymmetric secret key and realization method thereof
CN103248479A (en) Cloud storage safety system, data protection method and data sharing method
CN1926802A (en) Safety data transmission
CN111815816B (en) Electronic lock security system and key distribution method thereof
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
CN102831359A (en) Encryption file system of portable mobile storage device
CN110225014B (en) Internet of things equipment identity authentication method based on fingerprint centralized issuing mode
CN113472793A (en) Personal data protection system based on hardware password equipment
CN111815814A (en) Electronic lock security system and binding authentication method thereof
CN111540093A (en) Access control system and control method thereof
CN105471901A (en) Industrial information security authentication system
CN111583482A (en) Access control system based on two-dimensional code and control method thereof
KR101358375B1 (en) Prevention security system and method for smishing
CN114286331B (en) Identity authentication method and system suitable for electric power Internet of things 5G data terminal
CN110210199B (en) Internet of things equipment identity authentication method based on fingerprint acquisition and identification
CN112787996A (en) Password equipment management method and system
CN111698203A (en) Cloud data encryption method
CN100566239C (en) The key transmission method of multi-stage intelligent key apparatus and system
CN102098282B (en) Secure encryption method for database
CN114117471A (en) Confidential data management method, electronic device, storage medium, and program product
CN111541652B (en) System for improving security of secret information keeping and transmission
CN114282189A (en) Data security storage method, system, client and server
CN114553557A (en) Key calling method, key calling device, computer equipment and storage medium
CN114173303A (en) Train-ground session key generation method and system for CTCS-3 level train control system
CN112135278A (en) D2D communication privacy protection method facing 5G

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant