CN115311763A - A kind of identification method and system - Google Patents
A kind of identification method and system Download PDFInfo
- Publication number
- CN115311763A CN115311763A CN202210725306.8A CN202210725306A CN115311763A CN 115311763 A CN115311763 A CN 115311763A CN 202210725306 A CN202210725306 A CN 202210725306A CN 115311763 A CN115311763 A CN 115311763A
- Authority
- CN
- China
- Prior art keywords
- signal
- response signal
- electronic lock
- authentication
- electronic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 230000004044 response Effects 0.000 claims abstract description 72
- 238000012937 correction Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004519 manufacturing process Methods 0.000 claims description 3
- 239000004065 semiconductor Substances 0.000 claims description 2
- 230000007274 generation of a signal involved in cell-cell signaling Effects 0.000 claims 1
- 238000005516 engineering process Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
Description
技术领域technical field
本发明涉及信息安全技术领域,具体涉及一种身份识别方法及系统。The invention relates to the technical field of information security, in particular to an identification method and system.
背景技术Background technique
目前,随机电子技术的发展,基于电子认证技术及通信技术的电子锁得到了广泛的应用。At present, with the development of random electronic technology, electronic locks based on electronic authentication technology and communication technology have been widely used.
通常地,由于传统的机械锁存在着安全性差,可复制性强,安全无法保障的问题。使用生物特征信息、数字密码进行认证的电子锁,用户通过提前将目标密码或者身份信息录入电子锁中,通过密码访问或者验证生物特征信息即可实现对智能锁的控制,而在使用电子锁过程中,较容易被黑客监听,增大了目标密码和生物特征别复制、伪造、重放攻击的风险。另外,目前传统的基于物理不可克隆函数的认证方案需要将响应对存储在认证设备中,一旦攻击者获取了该响应对就可以伪装成认证方进行认证。Usually, the traditional mechanical lock has the problems of poor safety and strong reproducibility, and the safety cannot be guaranteed. For electronic locks that use biometric information and digital passwords for authentication, the user can control the smart lock by entering the target password or identity information into the electronic lock in advance, accessing or verifying the biometric information through the password, and in the process of using the electronic lock Among them, it is easier to be monitored by hackers, which increases the risk of target password and biometric copying, forgery, and replay attacks. In addition, the current traditional authentication scheme based on physical unclonable functions needs to store the response pair in the authentication device. Once the attacker obtains the response pair, he can pretend to be the authenticator for authentication.
发明内容Contents of the invention
为了解决上述技术问题,本发明提供一种身份识别方法及系统。In order to solve the above technical problems, the present invention provides an identification method and system.
本发明技术解决方案为:一种身份识别方法,包括:The technical solution of the present invention is: an identification method, comprising:
步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;
步骤S2:所述电子锁接收所述认证请求后随机生成驱动信号,发送到所述电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;
步骤S3:所述电子钥匙通过第一超晶格密码器件将所述驱动信号转化为第一响应信号,再将所述第一响应信号转化为重建信号发送给所述电子锁;Step S3: the electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;
步骤S4:所述电子锁通过第二超晶格密码器件将所述驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through a second superlattice cryptographic device;
步骤S5:所述电子锁对所述重建信号和所述第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。Step S5: The electronic lock performs an alignment on the reconstruction signal and the second response signal, and if the alignment is successful, the authentication is successful, otherwise the authentication fails.
本发明与现有技术相比,具有以下优点:Compared with the prior art, the present invention has the following advantages:
1、本发明公开了一种身份识别方法,利用超晶格器件的不可复制性和单向不可克隆性,相比传统的电子锁系统,本发明增加了伪造、复制的难度,有效地提高了身份识别的安全性。1. The present invention discloses an identification method, which uses the non-reproducibility and one-way non-cloning of superlattice devices. Compared with the traditional electronic lock system, the present invention increases the difficulty of counterfeiting and duplication, and effectively improves the Identity security.
2、相对于现有的基于PUF的认证协议需要将激励响应对存储在认证设备中,本发明提供的方法中认证双方都无需存储固定的密钥,并且利用超晶格设备的不可复制性,只需保证物理设备不被攻击者破坏,即可保证整个系统的安全性,极大地提高了安全性。2. Compared with the existing PUF-based authentication protocol, which needs to store the stimulus-response pair in the authentication device, in the method provided by the present invention, neither authentication party needs to store a fixed key, and utilizes the non-reproducibility of the superlattice device, The security of the entire system can be ensured only by ensuring that the physical device is not damaged by the attacker, which greatly improves the security.
附图说明Description of drawings
图1为本发明实施例一中一种身份识别方法的流程图;FIG. 1 is a flowchart of an identification method in
图2为本发明实施例中一种身份识别方法流程示意图;Fig. 2 is a schematic flow chart of an identity recognition method in an embodiment of the present invention;
图3为本发明实施例二中一种身份识别方法的流程图;FIG. 3 is a flowchart of an identification method in
图4为本发明实施例三中一种身份识别系统的结构框图;FIG. 4 is a structural block diagram of an identity recognition system in
图5为本发明实施例四中一种身份识别系统的结构框图。Fig. 5 is a structural block diagram of an identity recognition system in
具体实施方式Detailed ways
本发明提供了一种身份识别方法,利用超晶格器件的不可复制性和单向不可克隆性,有效地提高了身份识别的安全性。The invention provides an identity identification method, which effectively improves the security of identity identification by utilizing the non-reproducibility and one-way non-clonability of superlattice devices.
为了使本发明的目的、技术方案及优点更加清楚,以下通过具体实施,并结合附图,对本发明进一步详细说明。In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below through specific implementation and in conjunction with the accompanying drawings.
实施例一Embodiment one
如图1所示,本发明实施例提供的一种身份识别方法,包括下述步骤:As shown in Figure 1, a kind of identification method that the embodiment of the present invention provides, comprises the following steps:
步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;
步骤S2:电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;
步骤S3:电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Step S3: The electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;
步骤S4:电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through the second superlattice cryptographic device;
步骤S5:电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。Step S5: The electronic lock performs an alignment between the reconstruction signal and the second response signal, and if the alignment is successful, the authentication is successful, otherwise the authentication fails.
在一个实施例中,上述步骤S3和S4中电子钥匙和电子锁分别安装有第一超晶格密码器件和第二超晶格密码器件,二者结构相同,且制作工艺相同,且制作时位于同一片半导体晶圆的邻近位置。在本发明实施例中,不限制电子钥匙还是电子锁的数量。电子钥匙与电子锁数量取决是用户需求,并根据需求同一批制作相同数量的电子钥匙和电子锁以及电子钥匙和电子锁对应的超晶格密码器件,只要是相匹配的电子钥匙和电子锁都可以完成上述的认证工作。本发明实施例中不限制电子钥匙与电子锁之间使用何种信息通信技术,可以是蓝牙通信技术、Wifi通信技术、NFC通信技术或USB接口通信。In one embodiment, the electronic key and the electronic lock in the above steps S3 and S4 are respectively equipped with a first superlattice cryptographic device and a second superlattice cryptographic device, both of which have the same structure and the same manufacturing process, and are located at Adjacent locations on the same semiconductor wafer. In the embodiment of the present invention, the number of electronic keys or electronic locks is not limited. The number of electronic keys and electronic locks depends on the needs of users, and the same number of electronic keys and electronic locks as well as the corresponding superlattice cryptographic devices for electronic keys and electronic locks are produced in the same batch according to the requirements. As long as the matching electronic keys and electronic locks are The above authentication work can be completed. In the embodiment of the present invention, there is no limitation on which information communication technology is used between the electronic key and the electronic lock, and it may be Bluetooth communication technology, Wifi communication technology, NFC communication technology or USB interface communication.
由于超晶格密码器件具有不可克隆性、单向不可预测性,相比传统的电子锁系统,本发明利用超晶格密码器件进行身份认证,增加了伪造、复制的难度,有效地提高了身份识别的安全性。Due to the unclonability and one-way unpredictability of the superlattice cryptographic device, compared with the traditional electronic lock system, the present invention uses the superlattice cryptographic device for identity authentication, which increases the difficulty of forgery and duplication, and effectively improves the identity security. identification security.
在一个实施例中,上述步骤S2中随机生成驱动信号,具体包括:In one embodiment, the drive signal is randomly generated in the above step S2, specifically including:
将基于物理随机源(例如基于时间和环境温度变量)生成的随机序列作为驱动信号,且确保同一随机序列不会重复出现,并具有不可预测性。The random sequence generated based on physical random sources (such as based on time and environmental temperature variables) is used as the driving signal, and it is ensured that the same random sequence will not appear repeatedly and is unpredictable.
在一个实施例中,上述步骤S3中将第一响应信号转化为重建信号,具体包括:In one embodiment, converting the first response signal into a reconstruction signal in the above step S3 specifically includes:
对第一响应信号进行纠错编码,可采用但不限于BCH码、LDPC码、Polar码等纠错码,得到重建信号。Performing error correction coding on the first response signal may use but not limited to BCH code, LDPC code, Polar code and other error correction codes to obtain a reconstructed signal.
在一个实施例中,上述步骤S5中电子锁对重建信号和第二响应信号进行调同,具体包括:In one embodiment, in step S5 above, the electronic lock coordinates the reconstruction signal and the second response signal, specifically including:
电子锁对利用重建信号对第二响应信号进行纠错,得到第一响应信号,如果第二响应信号与第一响应信号的差异小于阈值,则认证成功;否则,则认证失败。The electronic lock pair uses the reconstruction signal to correct the second response signal to obtain the first response signal. If the difference between the second response signal and the first response signal is less than the threshold, the authentication is successful; otherwise, the authentication fails.
在本步骤中,电子锁首先根据接收重建信号和第二响应信号通过已知的纠错编码算法(即步骤S3中将第一响应信号转化为重建信号所用的纠错编码)进行计算,可以得出错误位(存在差异的比特位),然后对第二响应信号的错误位进行纠错,当纠错成功,则可以计算得到第一响应信号,此时认证成功,电子锁开锁;如果纠错失败,无法得到第一响应信号,则认证失败,电子锁不开锁。In this step, the electronic lock first performs calculations based on the received reconstruction signal and the second response signal through a known error correction coding algorithm (that is, the error correction code used to convert the first response signal into a reconstruction signal in step S3), and it can be obtained Error bits (bits with differences) are output, and then the error bits of the second response signal are corrected. When the error correction is successful, the first response signal can be calculated. At this time, the authentication is successful and the electronic lock is unlocked; if the error correction If it fails, the first response signal cannot be obtained, then the authentication fails and the electronic lock cannot be unlocked.
相对于现有的基于PUF的认证协议需要将响应对存储在认证设备中,本发明提供的方法中认证双方都无需存储固定的密钥,并且利用超晶格设备的不可复制性,只需保证物理设备不被攻击者破坏,即可保证整个系统的安全性,极大地提高了安全性。Compared with the existing PUF-based authentication protocol, which needs to store the response pair in the authentication device, in the method provided by the present invention, both sides of the authentication do not need to store a fixed key, and using the non-reproducibility of the superlattice device, only need to ensure The security of the entire system can be guaranteed if the physical device is not damaged by the attacker, which greatly improves the security.
图2展示了本发明提供的身份认证的方法流程示意图,其中认证端为电子锁端,被认证端为电子钥匙端。Fig. 2 shows a schematic flowchart of the identity authentication method provided by the present invention, wherein the authenticating end is an electronic lock end, and the authenticated end is an electronic key end.
本发明的身份认证方法,不仅只适用于电子锁电子钥匙,任何需要身份验证的设备均可适用本方法,例如射频识别系统、NFC识别系统。The identity authentication method of the present invention is not only applicable to electronic locks and electronic keys, but also applicable to any equipment requiring identity authentication, such as radio frequency identification systems and NFC identification systems.
在实施例一基础上,可以利用调同成功的第一响应信号和第二响应信号作为共同密钥进行加密数据传输,从而实现其他认证因子进行身份认证。On the basis of the first embodiment, the first response signal and the second response signal that have been successfully tuned can be used as a common key for encrypted data transmission, thereby implementing other authentication factors for identity authentication.
实施例二Embodiment two
如图3所示,本发明实施例提供的一种身份识别方法,包括下述步骤:As shown in Figure 3, an identification method provided by an embodiment of the present invention includes the following steps:
步骤S1:电子钥匙向电子锁发送认证请求;Step S1: the electronic key sends an authentication request to the electronic lock;
步骤S2:电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Step S2: After receiving the authentication request, the electronic lock randomly generates a drive signal and sends it to the electronic key;
步骤S3:电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Step S3: The electronic key converts the driving signal into a first response signal through the first superlattice cryptographic device, and then converts the first response signal into a reconstruction signal and sends it to the electronic lock;
步骤S4:电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Step S4: the electronic lock converts the driving signal into a second response signal through the second superlattice cryptographic device;
步骤S5:电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败;Step S5: The electronic lock coordinates the reconstruction signal and the second response signal, if the synchronization is successful, the authentication is successful, otherwise the authentication fails;
上述步骤S1~步骤S5具体实施细节同实施例中一种步骤S1~S5;The specific implementation details of the above steps S1 to S5 are the same as the steps S1 to S5 in the embodiment;
步骤S6:如果认证成功,则第一响应信号和调同后的第二响应信号作为电子钥匙与电子锁的共同密钥,二者可基于共同密钥进行加密数据传输。Step S6: If the authentication is successful, the first response signal and the coordinated second response signal are used as the common key of the electronic key and the electronic lock, and the two can transmit encrypted data based on the common key.
基于电子钥匙与电子锁的形成的共同密钥,可以使用如密码、生物体征等认证因子进行身份认证,电子锁与电子钥匙端的交互认证信息均由达成的相同密钥进行对称加密传输。Based on the common key formed by the electronic key and the electronic lock, authentication factors such as passwords and biometrics can be used for identity authentication, and the interactive authentication information between the electronic lock and the electronic key is symmetrically encrypted and transmitted by the same key.
实施例三Embodiment Three
如图4所示,本发明实施例提供了一种身份识别系统,包括下述模块:As shown in Figure 4, the embodiment of the present invention provides an identity recognition system, including the following modules:
发送认证请求模块1,用于电子钥匙向电子锁发送认证请求;Send an
生成驱动信号模块2,用于电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Generate a
生成第一响应信号和重建信号模块3,用于电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Generate the first response signal and
生成第二响应信号模块4,用于电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Generate a second
调同模块5,用于电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败。The
实施例四Embodiment Four
如图5所示,本发明实施例提供了一种身份识别系统,包括下述模块:As shown in Figure 5, an embodiment of the present invention provides an identity recognition system, including the following modules:
发送认证请求模块1,用于电子钥匙向电子锁发送认证请求;Send an
生成驱动信号模块2,用于电子锁接收认证请求后随机生成驱动信号,发送到电子钥匙;Generate a
生成第一响应信号和重建信号模块3,用于电子钥匙通过第一超晶格密码器件将驱动信号转化为第一响应信号,再将第一响应信号转化为重建信号发送给电子锁;Generate the first response signal and
生成第二响应信号模块4,用于电子锁通过第二超晶格密码器件将驱动信号转化为第二响应信号;Generate a second
调同模块5,用于电子锁对重建信号和第二响应信号进行调同,如果调同成功,则认证成功,否则认证失败;The
加密数据传输模块6:如果调同模块认证成功,则第一响应信号和调同后的第二响应信号作为电子钥匙与电子锁的共同密钥,二者可基于共同密钥进行加密数据传输。Encrypted data transmission module 6: If the authentication of the harmonization module is successful, the first response signal and the second response signal after harmonization are used as the common key of the electronic key and the electronic lock, and the two can transmit encrypted data based on the common key.
提供以上实施例仅仅是为了描述本发明的目的,而并非要限制本发明的范围。本发明的范围由所附权利要求限定。不脱离本发明的精神和原理而做出的各种等同替换和修改,均应涵盖在本发明的范围之内。The above embodiments are provided only for the purpose of describing the present invention, not to limit the scope of the present invention. The scope of the invention is defined by the appended claims. Various equivalent replacements and modifications made without departing from the spirit and principle of the present invention shall fall within the scope of the present invention.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210725306.8A CN115311763A (en) | 2022-06-24 | 2022-06-24 | A kind of identification method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210725306.8A CN115311763A (en) | 2022-06-24 | 2022-06-24 | A kind of identification method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115311763A true CN115311763A (en) | 2022-11-08 |
Family
ID=83854883
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210725306.8A Pending CN115311763A (en) | 2022-06-24 | 2022-06-24 | A kind of identification method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115311763A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227269A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | A Digital Information or Key Binding and Publishing Method Based on Fingerprint Frequency Domain |
CN102111418A (en) * | 2011-03-02 | 2011-06-29 | 北京工业大学 | Facial feature cryptographic key generation-based internet identity authentication method |
CN106600799A (en) * | 2017-02-06 | 2017-04-26 | 苏州欧特威电子科技有限公司 | Passive intelligent lock based on wireless charging and cipher mutual authentication |
US20180363327A1 (en) * | 2015-06-15 | 2018-12-20 | Bum Soo Kim | Electronic key and electronic locking device based on dual authentication |
WO2019223624A1 (en) * | 2018-05-22 | 2019-11-28 | 中国科学院苏州纳米技术与纳米仿生研究所 | Key distribution method and terminal device |
US20200014544A1 (en) * | 2018-07-03 | 2020-01-09 | Western Digital Technologies, Inc. | Non-volatile memory with replay protected memory block having dual key |
CN111049652A (en) * | 2019-12-23 | 2020-04-21 | 北京明朝万达科技股份有限公司 | Data transmission method and device, electronic equipment and computer readable storage medium |
CN111225358A (en) * | 2019-12-24 | 2020-06-02 | 北京明朝万达科技股份有限公司 | Identity recognition method and device, electronic equipment and storage medium |
CN111314065A (en) * | 2020-01-21 | 2020-06-19 | 中国科学院苏州纳米技术与纳米仿生研究所 | Data encryption transmission method, server and system based on virtual private network |
CN111324899A (en) * | 2020-01-21 | 2020-06-23 | 中国科学院苏州纳米技术与纳米仿生研究所 | Method, device and system for storing/reading data |
CN112102529A (en) * | 2020-09-25 | 2020-12-18 | 无锡职业技术学院 | Power facility protection system based on passive intelligent lock and execution process thereof |
US20220045857A1 (en) * | 2019-09-20 | 2022-02-10 | University Of Electronic Science And Technology Of China | Key distribution method and system based on synchronized broadband physical random sources |
CN114248722A (en) * | 2020-09-24 | 2022-03-29 | 长城汽车股份有限公司 | Control method and device and vehicle |
-
2022
- 2022-06-24 CN CN202210725306.8A patent/CN115311763A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101227269A (en) * | 2007-01-18 | 2008-07-23 | 中国科学院自动化研究所 | A Digital Information or Key Binding and Publishing Method Based on Fingerprint Frequency Domain |
CN102111418A (en) * | 2011-03-02 | 2011-06-29 | 北京工业大学 | Facial feature cryptographic key generation-based internet identity authentication method |
US20180363327A1 (en) * | 2015-06-15 | 2018-12-20 | Bum Soo Kim | Electronic key and electronic locking device based on dual authentication |
CN106600799A (en) * | 2017-02-06 | 2017-04-26 | 苏州欧特威电子科技有限公司 | Passive intelligent lock based on wireless charging and cipher mutual authentication |
WO2019223624A1 (en) * | 2018-05-22 | 2019-11-28 | 中国科学院苏州纳米技术与纳米仿生研究所 | Key distribution method and terminal device |
US20200014544A1 (en) * | 2018-07-03 | 2020-01-09 | Western Digital Technologies, Inc. | Non-volatile memory with replay protected memory block having dual key |
US20220045857A1 (en) * | 2019-09-20 | 2022-02-10 | University Of Electronic Science And Technology Of China | Key distribution method and system based on synchronized broadband physical random sources |
CN111049652A (en) * | 2019-12-23 | 2020-04-21 | 北京明朝万达科技股份有限公司 | Data transmission method and device, electronic equipment and computer readable storage medium |
CN111225358A (en) * | 2019-12-24 | 2020-06-02 | 北京明朝万达科技股份有限公司 | Identity recognition method and device, electronic equipment and storage medium |
CN111314065A (en) * | 2020-01-21 | 2020-06-19 | 中国科学院苏州纳米技术与纳米仿生研究所 | Data encryption transmission method, server and system based on virtual private network |
CN111324899A (en) * | 2020-01-21 | 2020-06-23 | 中国科学院苏州纳米技术与纳米仿生研究所 | Method, device and system for storing/reading data |
CN114248722A (en) * | 2020-09-24 | 2022-03-29 | 长城汽车股份有限公司 | Control method and device and vehicle |
CN112102529A (en) * | 2020-09-25 | 2020-12-18 | 无锡职业技术学院 | Power facility protection system based on passive intelligent lock and execution process thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11057204B2 (en) | Methods for encrypted data communications | |
CN106789047B (en) | A kind of block chain identification system | |
US9887976B2 (en) | Multi-factor authentication using quantum communication | |
JP7192122B2 (en) | Systems and methods for authenticating connections between user devices and vehicles | |
CN1777096B (en) | Password protection method and device | |
US11146410B2 (en) | Pseudo-random generation of matrices for a computational fuzzy extractor and method for authentication | |
EP2456121A2 (en) | Challenge response based enrollment of physical unclonable functions | |
CN105871553A (en) | Identity-free three-factor remote user authentication method | |
CN110943976A (en) | Password-based user signature private key management method | |
US11223490B2 (en) | Robust computational fuzzy extractor and method for authentication | |
CN114070559B (en) | Industrial Internet of things session key negotiation method based on multiple factors | |
CN114070567A (en) | Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology | |
CN113114475A (en) | PUF identity authentication system and protocol based on bit self-checking | |
CN115913577A (en) | Anti-physical cloning equipment authentication system and method based on lightweight SPONGENT hash algorithm | |
US12212551B2 (en) | System and methods for PUF-based authentication | |
EP3563515B1 (en) | Reverse computational fuzzy extractor and method for authentication | |
US20240163116A1 (en) | Method for implementing mutual authentication protocol based on radio frequency fingerprint and fuzzy extractor | |
EP3185504A1 (en) | Security management system for securing a communication between a remote server and an electronic device | |
CN115311763A (en) | A kind of identification method and system | |
CN108737103B (en) | A Signature Method of SM2 Algorithm Applied to CS Architecture | |
CN115280813B (en) | Interactive authentication method, device and system, computer equipment and readable storage medium | |
Alshaeri et al. | Distributed Hardware-Assisted Authentication and Key Agreement Protocol for Internet of Things | |
CN114157418B (en) | Trusted data uplink device and method based on quantum network | |
Wang et al. | Research on Connectionless Identity Authentication Method Based on National Cryptographic Algorithm | |
Barman et al. | Toward design a secure protocol for updating remotely stored credentials of a crypto‐biometric framework for multi‐server environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20221108 |