[go: up one dir, main page]

CN115311763A - A kind of identification method and system - Google Patents

A kind of identification method and system Download PDF

Info

Publication number
CN115311763A
CN115311763A CN202210725306.8A CN202210725306A CN115311763A CN 115311763 A CN115311763 A CN 115311763A CN 202210725306 A CN202210725306 A CN 202210725306A CN 115311763 A CN115311763 A CN 115311763A
Authority
CN
China
Prior art keywords
signal
response signal
electronic lock
authentication
electronic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210725306.8A
Other languages
Chinese (zh)
Inventor
李晨
封化民
刘飚
许盛伟
徐丽伟
武洲铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Original Assignee
BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE filed Critical BEIJING ELECTRONIC SCIENCE AND TECHNOLOGY INSTITUTE
Priority to CN202210725306.8A priority Critical patent/CN115311763A/en
Publication of CN115311763A publication Critical patent/CN115311763A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an identity recognition method and system, wherein the method comprises the following steps: s1: the electronic key sends an authentication request to the electronic lock; s2: the electronic lock randomly generates a driving signal after receiving the authentication request and sends the driving signal to the electronic key; s3: the electronic key converts the driving signal into a first response signal through the first superlattice password device, converts the first response signal into a reconstruction signal and sends the reconstruction signal to the electronic lock; s4: the electronic lock converts the driving signal into a second response signal through a second superlattice password device; s5: and the electronic lock is used for adjusting the reestablishing signal and the second response signal, if the adjustment is successful, the authentication is successful, otherwise, the authentication is failed. According to the method provided by the invention, the two authentication parties do not need to store fixed keys, and only by utilizing the non-replicability of the superlattice equipment and ensuring that the physical equipment is not damaged by an attacker, the safety of the whole system can be ensured, and the safety is greatly improved.

Description

一种身份识别方法及系统An identification method and system

技术领域technical field

本发明涉及信息安全技术领域,具体涉及一种身份识别方法及系统。The invention relates to the technical field of information security, in particular to an identification method and system.

背景技术Background technique

目前,随机电子技术的发展,基于电子认证技术及通信技术的电子锁得到了广泛的应用。At present, with the development of random electronic technology, electronic locks based on electronic authentication technology and communication technology have been widely used.

通常地,由于传统的机械锁存在着安全性差,可复制性强,安全无法保障的问题。使用生物特征信息、数字密码进行认证的电子锁,用户通过提前将目标密码或者身份信息录入电子锁中,通过密码访问或者验证生物特征信息即可实现对智能锁的控制,而在使用电子锁过程中,较容易被黑客监听,增大了目标密码和生物特征别复制、伪造、重放攻击的风险。另外,目前传统的基于物理不可克隆函数的认证方案需要将响应对存储在认证设备中,一旦攻击者获取了该响应对就可以伪装成认证方进行认证。Usually, the traditional mechanical lock has the problems of poor safety and strong reproducibility, and the safety cannot be guaranteed. For electronic locks that use biometric information and digital passwords for authentication, the user can control the smart lock by entering the target password or identity information into the electronic lock in advance, accessing or verifying the biometric information through the password, and in the process of using the electronic lock Among them, it is easier to be monitored by hackers, which increases the risk of target password and biometric copying, forgery, and replay attacks. In addition, the current traditional authentication scheme based on physical unclonable functions needs to store the response pair in the authentication device. Once the attacker obtains the response pair, he can pretend to be the authenticator for authentication.

发明内容Contents of the invention

为了解决上述技术问题,本发明提供一种身份识别方法及系统。In order to solve the above technical problems, the present invention provides an identification method and system.

本发明技术解决方案为:一种身份识别方法,包括:The technical solution of the present invention is: an identification method, comprising:

步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;

步骤S2:所述电子锁接收所述认证请求后随机生成驱动信号,发送到所述电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;

步骤S3:所述电子钥匙通过第一超晶格密码器件将所述驱动信号转化为第一响应信号,再将所述第一响应信号转化为重建信号发送给所述电子锁;Step S3: the electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;

步骤S4:所述电子锁通过第二超晶格密码器件将所述驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through a second superlattice cryptographic device;

步骤S5:所述电子锁对所述重建信号和所述第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。Step S5: The electronic lock performs an alignment on the reconstruction signal and the second response signal, and if the alignment is successful, the authentication is successful, otherwise the authentication fails.

本发明与现有技术相比,具有以下优点:Compared with the prior art, the present invention has the following advantages:

1、本发明公开了一种身份识别方法,利用超晶格器件的不可复制性和单向不可克隆性,相比传统的电子锁系统,本发明增加了伪造、复制的难度,有效地提高了身份识别的安全性。1. The present invention discloses an identification method, which uses the non-reproducibility and one-way non-cloning of superlattice devices. Compared with the traditional electronic lock system, the present invention increases the difficulty of counterfeiting and duplication, and effectively improves the Identity security.

2、相对于现有的基于PUF的认证协议需要将激励响应对存储在认证设备中,本发明提供的方法中认证双方都无需存储固定的密钥,并且利用超晶格设备的不可复制性,只需保证物理设备不被攻击者破坏,即可保证整个系统的安全性,极大地提高了安全性。2. Compared with the existing PUF-based authentication protocol, which needs to store the stimulus-response pair in the authentication device, in the method provided by the present invention, neither authentication party needs to store a fixed key, and utilizes the non-reproducibility of the superlattice device, The security of the entire system can be ensured only by ensuring that the physical device is not damaged by the attacker, which greatly improves the security.

附图说明Description of drawings

图1为本发明实施例一中一种身份识别方法的流程图;FIG. 1 is a flowchart of an identification method in Embodiment 1 of the present invention;

图2为本发明实施例中一种身份识别方法流程示意图;Fig. 2 is a schematic flow chart of an identity recognition method in an embodiment of the present invention;

图3为本发明实施例二中一种身份识别方法的流程图;FIG. 3 is a flowchart of an identification method in Embodiment 2 of the present invention;

图4为本发明实施例三中一种身份识别系统的结构框图;FIG. 4 is a structural block diagram of an identity recognition system in Embodiment 3 of the present invention;

图5为本发明实施例四中一种身份识别系统的结构框图。Fig. 5 is a structural block diagram of an identity recognition system in Embodiment 4 of the present invention.

具体实施方式Detailed ways

本发明提供了一种身份识别方法,利用超晶格器件的不可复制性和单向不可克隆性,有效地提高了身份识别的安全性。The invention provides an identity identification method, which effectively improves the security of identity identification by utilizing the non-reproducibility and one-way non-clonability of superlattice devices.

为了使本发明的目的、技术方案及优点更加清楚,以下通过具体实施,并结合附图,对本发明进一步详细说明。In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through specific implementation and in conjunction with the accompanying drawings.

实施例一Embodiment one

如图1所示,本发明实施例提供的一种身份识别方法,包括下述步骤:As shown in Figure 1, a kind of identification method that the embodiment of the present invention provides, comprises the following steps:

步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;

步骤S2:电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;

步骤S3:电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Step S3: The electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;

步骤S4:电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through the second superlattice cryptographic device;

步骤S5:电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。Step S5: The electronic lock performs an alignment between the reconstruction signal and the second response signal, and if the alignment is successful, the authentication is successful, otherwise the authentication fails.

在一个实施例中,上述步骤S3和S4中电子钥匙和电子锁分别安装有第一超晶格密码器件和第二超晶格密码器件,二者结构相同,且制作工艺相同,且制作时位于同一片半导体晶圆的邻近位置。在本发明实施例中,不限制电子钥匙还是电子锁的数量。电子钥匙与电子锁数量取决是用户需求,并根据需求同一批制作相同数量的电子钥匙和电子锁以及电子钥匙和电子锁对应的超晶格密码器件,只要是相匹配的电子钥匙和电子锁都可以完成上述的认证工作。本发明实施例中不限制电子钥匙与电子锁之间使用何种信息通信技术,可以是蓝牙通信技术、Wifi通信技术、NFC通信技术或USB接口通信。In one embodiment, the electronic key and the electronic lock in the above steps S3 and S4 are respectively equipped with a first superlattice cryptographic device and a second superlattice cryptographic device, both of which have the same structure and the same manufacturing process, and are located at Adjacent locations on the same semiconductor wafer. In the embodiment of the present invention, the number of electronic keys or electronic locks is not limited. The number of electronic keys and electronic locks depends on the needs of users, and the same number of electronic keys and electronic locks as well as the corresponding superlattice cryptographic devices for electronic keys and electronic locks are produced in the same batch according to the requirements. As long as the matching electronic keys and electronic locks are The above authentication work can be completed. In the embodiment of the present invention, there is no limitation on which information communication technology is used between the electronic key and the electronic lock, and it may be Bluetooth communication technology, Wifi communication technology, NFC communication technology or USB interface communication.

由于超晶格密码器件具有不可克隆性、单向不可预测性,相比传统的电子锁系统,本发明利用超晶格密码器件进行身份认证,增加了伪造、复制的难度,有效地提高了身份识别的安全性。Due to the unclonability and one-way unpredictability of the superlattice cryptographic device, compared with the traditional electronic lock system, the present invention uses the superlattice cryptographic device for identity authentication, which increases the difficulty of forgery and duplication, and effectively improves the identity security. identification security.

在一个实施例中,上述步骤S2中随机生成驱动信号,具体包括:In one embodiment, the drive signal is randomly generated in the above step S2, specifically including:

将基于物理随机源(例如基于时间和环境温度变量)生成的随机序列作为驱动信号,且确保同一随机序列不会重复出现,并具有不可预测性。The random sequence generated based on physical random sources (such as based on time and environmental temperature variables) is used as the driving signal, and it is ensured that the same random sequence will not appear repeatedly and is unpredictable.

在一个实施例中,上述步骤S3中将第一响应信号转化为重建信号,具体包括:In one embodiment, converting the first response signal into a reconstruction signal in the above step S3 specifically includes:

对第一响应信号进行纠错编码,可采用但不限于BCH码、LDPC码、Polar码等纠错码,得到重建信号。Performing error correction coding on the first response signal may use but not limited to BCH code, LDPC code, Polar code and other error correction codes to obtain a reconstructed signal.

在一个实施例中,上述步骤S5中电子锁对重建信号和第二响应信号进行调同,具体包括:In one embodiment, in step S5 above, the electronic lock coordinates the reconstruction signal and the second response signal, specifically including:

电子锁对利用重建信号对第二响应信号进行纠错,得到第一响应信号,如果第二响应信号与第一响应信号的差异小于阈值,则认证成功;否则,则认证失败。The electronic lock pair uses the reconstruction signal to correct the second response signal to obtain the first response signal. If the difference between the second response signal and the first response signal is less than the threshold, the authentication is successful; otherwise, the authentication fails.

在本步骤中,电子锁首先根据接收重建信号和第二响应信号通过已知的纠错编码算法(即步骤S3中将第一响应信号转化为重建信号所用的纠错编码)进行计算,可以得出错误位(存在差异的比特位),然后对第二响应信号的错误位进行纠错,当纠错成功,则可以计算得到第一响应信号,此时认证成功,电子锁开锁;如果纠错失败,无法得到第一响应信号,则认证失败,电子锁不开锁。In this step, the electronic lock first performs calculations based on the received reconstruction signal and the second response signal through a known error correction coding algorithm (that is, the error correction code used to convert the first response signal into a reconstruction signal in step S3), and it can be obtained Error bits (bits with differences) are output, and then the error bits of the second response signal are corrected. When the error correction is successful, the first response signal can be calculated. At this time, the authentication is successful and the electronic lock is unlocked; if the error correction If it fails, the first response signal cannot be obtained, then the authentication fails and the electronic lock cannot be unlocked.

相对于现有的基于PUF的认证协议需要将响应对存储在认证设备中,本发明提供的方法中认证双方都无需存储固定的密钥,并且利用超晶格设备的不可复制性,只需保证物理设备不被攻击者破坏,即可保证整个系统的安全性,极大地提高了安全性。Compared with the existing PUF-based authentication protocol, which needs to store the response pair in the authentication device, in the method provided by the present invention, both sides of the authentication do not need to store a fixed key, and using the non-reproducibility of the superlattice device, only need to ensure The security of the entire system can be guaranteed if the physical device is not damaged by the attacker, which greatly improves the security.

图2展示了本发明提供的身份认证的方法流程示意图,其中认证端为电子锁端,被认证端为电子钥匙端。Fig. 2 shows a schematic flowchart of the identity authentication method provided by the present invention, wherein the authenticating end is an electronic lock end, and the authenticated end is an electronic key end.

本发明的身份认证方法,不仅只适用于电子锁电子钥匙,任何需要身份验证的设备均可适用本方法,例如射频识别系统、NFC识别系统。The identity authentication method of the present invention is not only applicable to electronic locks and electronic keys, but also applicable to any equipment requiring identity authentication, such as radio frequency identification systems and NFC identification systems.

在实施例一基础上,可以利用调同成功的第一响应信号和第二响应信号作为共同密钥进行加密数据传输,从而实现其他认证因子进行身份认证。On the basis of the first embodiment, the first response signal and the second response signal that have been successfully tuned can be used as a common key for encrypted data transmission, thereby implementing other authentication factors for identity authentication.

实施例二Embodiment two

如图3所示,本发明实施例提供的一种身份识别方法,包括下述步骤:As shown in Figure 3, an identification method provided by an embodiment of the present invention includes the following steps:

步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;

步骤S2:电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;

步骤S3:电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Step S3: The electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;

步骤S4:电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through the second superlattice cryptographic device;

步骤S5:电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败;Step S5: The electronic lock coordinates the reconstruction signal and the second response signal, if the synchronization is successful, the authentication is successful, otherwise the authentication fails;

上述步骤S1~步骤S5具体实施细节同实施例中一种步骤S1~S5;The specific implementation details of the above steps S1 to S5 are the same as the steps S1 to S5 in the embodiment;

步骤S6:如果认证成功,则第一响应信号和调同后的第二响应信号作为电子钥匙与电子锁的共同密钥,二者可基于共同密钥进行加密数据传输。Step S6: If the authentication is successful, the first response signal and the coordinated second response signal are used as the common key of the electronic key and the electronic lock, and the two can transmit encrypted data based on the common key.

基于电子钥匙与电子锁的形成的共同密钥,可以使用如密码、生物体征等认证因子进行身份认证,电子锁与电子钥匙端的交互认证信息均由达成的相同密钥进行对称加密传输。Based on the common key formed by the electronic key and the electronic lock, authentication factors such as passwords and biometrics can be used for identity authentication, and the interactive authentication information between the electronic lock and the electronic key is symmetrically encrypted and transmitted by the same key.

实施例三Embodiment Three

如图4所示,本发明实施例提供了一种身份识别系统,包括下述模块:As shown in Figure 4, the embodiment of the present invention provides an identity recognition system, including the following modules:

发送认证请求模块1,用于电子钥匙向电子锁发送认证请求;Send an authentication request module 1, used for the electronic key to send an authentication request to the electronic lock;

生成驱动信号模块2,用于电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Generate a driving signal module 2, which is used to randomly generate a driving signal after the electronic lock receives the authentication request, and send it to the electronic key;

生成第一响应信号和重建信号模块3,用于电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Generate the first response signal and reconstruction signal module 3, for the electronic key to convert the driving signal into the first response signal through the first superlattice cryptographic device, and then convert the first response signal into the reconstruction signal and send it to the electronic lock;

生成第二响应信号模块4,用于电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Generate a second response signal module 4, which is used for the electronic lock to convert the driving signal into a second response signal through the second superlattice cryptographic device;

调同模块5,用于电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。The harmonization module 5 is used for the electronic lock to harmonize the reconstructed signal and the second response signal. If the harmonization is successful, the authentication is successful; otherwise, the authentication fails.

实施例四Embodiment Four

如图5所示,本发明实施例提供了一种身份识别系统,包括下述模块:As shown in Figure 5, an embodiment of the present invention provides an identity recognition system, including the following modules:

发送认证请求模块1,用于电子钥匙向电子锁发送认证请求;Send an authentication request module 1, used for the electronic key to send an authentication request to the electronic lock;

生成驱动信号模块2,用于电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Generate a driving signal module 2, which is used to randomly generate a driving signal after the electronic lock receives the authentication request, and send it to the electronic key;

生成第一响应信号和重建信号模块3,用于电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Generate the first response signal and reconstruction signal module 3, for the electronic key to convert the driving signal into the first response signal through the first superlattice cryptographic device, and then convert the first response signal into the reconstruction signal and send it to the electronic lock;

生成第二响应信号模块4,用于电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Generate a second response signal module 4, which is used for the electronic lock to convert the driving signal into a second response signal through the second superlattice cryptographic device;

调同模块5,用于电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败;The tuning module 5 is used for the electronic lock to tune the reconstructed signal and the second response signal. If the tuning is successful, the authentication is successful, otherwise the authentication fails;

加密数据传输模块6:如果调同模块认证成功,则第一响应信号和调同后的第二响应信号作为电子钥匙与电子锁的共同密钥,二者可基于共同密钥进行加密数据传输。Encrypted data transmission module 6: If the authentication of the harmonization module is successful, the first response signal and the second response signal after harmonization are used as the common key of the electronic key and the electronic lock, and the two can transmit encrypted data based on the common key.

提供以上实施例仅仅是为了描述本发明的目的,而并非要限制本发明的范围。本发明的范围由所附权利要求限定。不脱离本发明的精神和原理而做出的各种等同替换和修改,均应涵盖在本发明的范围之内。The above embodiments are provided only for the purpose of describing the present invention, not to limit the scope of the present invention. The scope of the invention is defined by the appended claims. Various equivalent replacements and modifications made without departing from the spirit and principle of the present invention shall fall within the scope of the present invention.

Claims (8)

1.一种身份识别方法,其特征在于,包括:1. An identification method, characterized in that, comprising: 步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock; 步骤S2:所述电子锁接收所述认证请求后随机生成驱动信号,发送到所述电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key; 步骤S3:所述电子钥匙通过第一超晶格密码器件将所述驱动信号转化为第一响应信号,再将所述第一响应信号转化为重建信号发送给所述电子锁;Step S3: the electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock; 步骤S4:所述电子锁通过第二超晶格密码器件将所述驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through a second superlattice cryptographic device; 步骤S5:所述电子锁对所述重建信号和所述第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。Step S5: The electronic lock performs an alignment on the reconstruction signal and the second response signal, and if the alignment is successful, the authentication is successful, otherwise the authentication fails. 2.根据权利要求1所述的身份识别方法,其特征在于,所述第一超晶格密码器件与所述第二超晶格密码器件结构相同、制作工艺相同,且制作时位于同一片半导体晶圆的邻近位置。2. The identification method according to claim 1, wherein the first superlattice cryptography device has the same structure and the same manufacturing process as the second superlattice cryptography device, and is located on the same piece of semiconductor during manufacture. The proximity of the wafer. 3.根据权利要求1所述的身份识别方法,其特征在于,所述步骤S2中随机生成驱动信号,具体包括:3. The identification method according to claim 1, wherein the random generation of a driving signal in the step S2 specifically includes: 将基于物理随机源生成的随机序列作为所述驱动信号。A random sequence generated based on a physical random source is used as the driving signal. 4.根据权利要求1所述的身份识别方法,其特征在于,所述步骤S3中将所述第一响应信号转化为重建信号,具体包括:4. The identification method according to claim 1, characterized in that, converting the first response signal into a reconstruction signal in the step S3 specifically includes: 对所述第一响应信号进行纠错编码后得到所述重建信号。The reconstructed signal is obtained after performing error correction coding on the first response signal. 5.根据权利要求1所述的身份识别方法,其特征在于,所述步骤S5中所述电子锁对所述重建信号和所述第二响应信号进行调同,具体包括:5. The identification method according to claim 1, wherein the electronic lock in the step S5 harmonizes the reconstruction signal and the second response signal, specifically comprising: 所述电子锁对利用所述重建信号对所述第二响应信号进行纠错,如果所述第二响应信号与所述第一响应信号的差异小于阈值,则可计算得到第一响应信号,此时认证成功;否则无法计算得到第一响应信号,此时认证失败。The electronic lock pair uses the reconstruction signal to correct the second response signal, and if the difference between the second response signal and the first response signal is less than a threshold, the first response signal can be calculated, and this The authentication is successful; otherwise, the first response signal cannot be calculated, and the authentication fails at this time. 6.一种身份识别方法,其特征在于,根据权利要求1~5任一所述身份识别方法,还包括步骤:6. An identification method, characterized in that, according to any one of claims 1 to 5, the identification method further comprises the steps of: 步骤S6:如果认证成功,则所述第一响应信号和调同后的所述第二响应信号作为所述电子钥匙与所述电子锁的共同密钥,二者可基于所述共同密钥进行加密数据传输。Step S6: If the authentication is successful, the first response signal and the coordinated second response signal are used as the common key of the electronic key and the electronic lock, and the two can be based on the common key. Encrypted data transmission. 7.一种身份识别系统,其特征在于,包括下述模块:7. An identification system, characterized in that it comprises the following modules: 发送认证请求模块,用于电子钥匙向电子锁发送认证请求;Send an authentication request module, used for the electronic key to send an authentication request to the electronic lock; 生成驱动信号模块,用于所述电子锁接收所述认证请求后随机生成驱动信号,发送到所述电子钥匙;A driving signal generation module, used for the electronic lock to randomly generate a driving signal after receiving the authentication request, and send it to the electronic key; 生成第一响应信号和重建信号模块,用于所述电子钥匙通过第一超晶格密码器件将所述驱动信号转化为第一响应信号,再将所述第一响应信号转化为重建信号发送给所述电子锁;Generating a first response signal and reconstruction signal module, used for the electronic key to convert the driving signal into a first response signal through the first superlattice cryptographic device, and then convert the first response signal into a reconstruction signal and send it to said electronic lock; 生成第二响应信号模块,用于所述电子锁通过第二超晶格密码器件将所述驱动信号转化为第二响应信号;generating a second response signal module, used for the electronic lock to convert the driving signal into a second response signal through a second superlattice cryptographic device; 调同模块,用于所述电子锁对所述重建信号和所述第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。The coordination module is used for the electronic lock to coordinate the reconstruction signal and the second response signal. If the coordination is successful, the authentication is successful; otherwise, the authentication fails. 8.根据权利要求7所述的身份识别系统,其特征在于,还包括下述模块:8. The identification system according to claim 7, further comprising the following modules: 加密数据传输模块:如果所述调同模块认证成功,则所述第一响应信号和调同后的所述第二响应信号作为所述电子钥匙与所述电子锁的共同密钥,二者可基于所述共同密钥进行加密数据传输。Encrypted data transmission module: if the authentication of the harmonization module is successful, the first response signal and the second response signal after harmonization are used as the common key of the electronic key and the electronic lock, and the two can Encrypted data transmission is based on the common key.
CN202210725306.8A 2022-06-24 2022-06-24 A kind of identification method and system Pending CN115311763A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210725306.8A CN115311763A (en) 2022-06-24 2022-06-24 A kind of identification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210725306.8A CN115311763A (en) 2022-06-24 2022-06-24 A kind of identification method and system

Publications (1)

Publication Number Publication Date
CN115311763A true CN115311763A (en) 2022-11-08

Family

ID=83854883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210725306.8A Pending CN115311763A (en) 2022-06-24 2022-06-24 A kind of identification method and system

Country Status (1)

Country Link
CN (1) CN115311763A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227269A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 A Digital Information or Key Binding and Publishing Method Based on Fingerprint Frequency Domain
CN102111418A (en) * 2011-03-02 2011-06-29 北京工业大学 Facial feature cryptographic key generation-based internet identity authentication method
CN106600799A (en) * 2017-02-06 2017-04-26 苏州欧特威电子科技有限公司 Passive intelligent lock based on wireless charging and cipher mutual authentication
US20180363327A1 (en) * 2015-06-15 2018-12-20 Bum Soo Kim Electronic key and electronic locking device based on dual authentication
WO2019223624A1 (en) * 2018-05-22 2019-11-28 中国科学院苏州纳米技术与纳米仿生研究所 Key distribution method and terminal device
US20200014544A1 (en) * 2018-07-03 2020-01-09 Western Digital Technologies, Inc. Non-volatile memory with replay protected memory block having dual key
CN111049652A (en) * 2019-12-23 2020-04-21 北京明朝万达科技股份有限公司 Data transmission method and device, electronic equipment and computer readable storage medium
CN111225358A (en) * 2019-12-24 2020-06-02 北京明朝万达科技股份有限公司 Identity recognition method and device, electronic equipment and storage medium
CN111314065A (en) * 2020-01-21 2020-06-19 中国科学院苏州纳米技术与纳米仿生研究所 Data encryption transmission method, server and system based on virtual private network
CN111324899A (en) * 2020-01-21 2020-06-23 中国科学院苏州纳米技术与纳米仿生研究所 Method, device and system for storing/reading data
CN112102529A (en) * 2020-09-25 2020-12-18 无锡职业技术学院 Power facility protection system based on passive intelligent lock and execution process thereof
US20220045857A1 (en) * 2019-09-20 2022-02-10 University Of Electronic Science And Technology Of China Key distribution method and system based on synchronized broadband physical random sources
CN114248722A (en) * 2020-09-24 2022-03-29 长城汽车股份有限公司 Control method and device and vehicle

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227269A (en) * 2007-01-18 2008-07-23 中国科学院自动化研究所 A Digital Information or Key Binding and Publishing Method Based on Fingerprint Frequency Domain
CN102111418A (en) * 2011-03-02 2011-06-29 北京工业大学 Facial feature cryptographic key generation-based internet identity authentication method
US20180363327A1 (en) * 2015-06-15 2018-12-20 Bum Soo Kim Electronic key and electronic locking device based on dual authentication
CN106600799A (en) * 2017-02-06 2017-04-26 苏州欧特威电子科技有限公司 Passive intelligent lock based on wireless charging and cipher mutual authentication
WO2019223624A1 (en) * 2018-05-22 2019-11-28 中国科学院苏州纳米技术与纳米仿生研究所 Key distribution method and terminal device
US20200014544A1 (en) * 2018-07-03 2020-01-09 Western Digital Technologies, Inc. Non-volatile memory with replay protected memory block having dual key
US20220045857A1 (en) * 2019-09-20 2022-02-10 University Of Electronic Science And Technology Of China Key distribution method and system based on synchronized broadband physical random sources
CN111049652A (en) * 2019-12-23 2020-04-21 北京明朝万达科技股份有限公司 Data transmission method and device, electronic equipment and computer readable storage medium
CN111225358A (en) * 2019-12-24 2020-06-02 北京明朝万达科技股份有限公司 Identity recognition method and device, electronic equipment and storage medium
CN111314065A (en) * 2020-01-21 2020-06-19 中国科学院苏州纳米技术与纳米仿生研究所 Data encryption transmission method, server and system based on virtual private network
CN111324899A (en) * 2020-01-21 2020-06-23 中国科学院苏州纳米技术与纳米仿生研究所 Method, device and system for storing/reading data
CN114248722A (en) * 2020-09-24 2022-03-29 长城汽车股份有限公司 Control method and device and vehicle
CN112102529A (en) * 2020-09-25 2020-12-18 无锡职业技术学院 Power facility protection system based on passive intelligent lock and execution process thereof

Similar Documents

Publication Publication Date Title
US11057204B2 (en) Methods for encrypted data communications
CN106789047B (en) A kind of block chain identification system
US9887976B2 (en) Multi-factor authentication using quantum communication
JP7192122B2 (en) Systems and methods for authenticating connections between user devices and vehicles
CN1777096B (en) Password protection method and device
US11146410B2 (en) Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication
EP2456121A2 (en) Challenge response based enrollment of physical unclonable functions
CN105871553A (en) Identity-free three-factor remote user authentication method
CN110943976A (en) Password-based user signature private key management method
US11223490B2 (en) Robust computational fuzzy extractor and method for authentication
CN114070559B (en) Industrial Internet of things session key negotiation method based on multiple factors
CN114070567A (en) Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology
CN113114475A (en) PUF identity authentication system and protocol based on bit self-checking
CN115913577A (en) Anti-physical cloning equipment authentication system and method based on lightweight SPONGENT hash algorithm
US12212551B2 (en) System and methods for PUF-based authentication
EP3563515B1 (en) Reverse computational fuzzy extractor and method for authentication
US20240163116A1 (en) Method for implementing mutual authentication protocol based on radio frequency fingerprint and fuzzy extractor
EP3185504A1 (en) Security management system for securing a communication between a remote server and an electronic device
CN115311763A (en) A kind of identification method and system
CN108737103B (en) A Signature Method of SM2 Algorithm Applied to CS Architecture
CN115280813B (en) Interactive authentication method, device and system, computer equipment and readable storage medium
Alshaeri et al. Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things
CN114157418B (en) Trusted data uplink device and method based on quantum network
Wang et al. Research on Connectionless Identity Authentication Method Based on National Cryptographic Algorithm
Barman et al. Toward design a secure protocol for updating remotely stored credentials of a crypto‐biometric framework for multi‐server environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221108