TWI682656B - Communication system using two kinds of keys - Google Patents
Communication system using two kinds of keys Download PDFInfo
- Publication number
- TWI682656B TWI682656B TW107125332A TW107125332A TWI682656B TW I682656 B TWI682656 B TW I682656B TW 107125332 A TW107125332 A TW 107125332A TW 107125332 A TW107125332 A TW 107125332A TW I682656 B TWI682656 B TW I682656B
- Authority
- TW
- Taiwan
- Prior art keywords
- server
- electronic device
- data
- key
- type
- Prior art date
Links
- 238000004891 communication Methods 0.000 title claims abstract description 68
- 230000005540 biological transmission Effects 0.000 claims abstract description 79
- 238000012795 verification Methods 0.000 claims description 21
- 238000000034 method Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 4
- 238000010295 mobile communication Methods 0.000 description 4
- QVFWZNCVPCJQOP-UHFFFAOYSA-N chloralodol Chemical compound CC(O)(C)CC(C)OC(O)C(Cl)(Cl)Cl QVFWZNCVPCJQOP-UHFFFAOYSA-N 0.000 description 2
- 238000001514 detection method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
Description
本發明有關於一種通訊系統,尤指一種利用兩種密鑰進行傳輸的通訊系統。 The invention relates to a communication system, especially a communication system that uses two keys for transmission.
由於智能電錶的出現,而使得智能電網能夠逐漸普及,不過現今智能電錶無論是利用有線網路或是無線網路傳輸資料。以無線網路作為主要傳輸方式的智能電網系統,除了電力資料,還有其他電力保護訊號需要傳輸,若是都使用同樣的密鑰進行傳輸,在機密等級不容易區分。 Due to the emergence of smart meters, smart grids can gradually become popular, but today smart meters use either wired or wireless networks to transmit data. In the smart grid system with wireless network as the main transmission method, in addition to power data, there are other power protection signals that need to be transmitted. If they all use the same key for transmission, it is not easy to distinguish at the confidential level.
有鑑於此,提供一個能夠依照不同機密等級資料進行通訊傳輸的通訊系統,實是業界的一個重要課題。 In view of this, it is an important issue in the industry to provide a communication system capable of communicating according to data of different confidential levels.
有鑑於此,本發明實施例提供了一種使用兩種密鑰進行通訊傳輸的通訊系統,包括:一伺服器;以及一第一電子裝置,具有一第一裝置預設密鑰;其中,當所述第一電子裝置發送一第一類型資料至所述伺服器之前,所述第一電子裝置提供對應所述第一類型資料的一第一傳輸要求訊號至所述伺服器,所述伺服器根據所述第一傳輸要求訊號產生一第一裝置密鑰,所述伺服器根據所述第一傳輸要求訊號,提供一第一驗證要求訊號至所述第一電子裝置,所述第一電子裝置根據所述第一驗證要求訊號傳送所述第一裝置預設密鑰至所述伺服器,所述伺服器驗證所述第一裝置預設密鑰是否與第一裝置密鑰相符合,以決定是否同意所述第一電 子裝置傳輸所述第一類型資料至所述伺服器;其中,當所述第一電子裝置發送一第二類型資料至所述伺服器時,所述第一電子裝置對一第一時間戳記以及一第二傳輸密鑰進行加密編碼,以產生一第一加密雜湊值,所述第一電子裝置傳送所述第一加密雜湊值至所述伺服器。 In view of this, embodiments of the present invention provide a communication system that uses two keys for communication transmission, including: a server; and a first electronic device with a first device preset key; Before the first electronic device sends a first type of data to the server, the first electronic device provides a first transmission request signal corresponding to the first type of data to the server, the server according to The first transmission request signal generates a first device key, and the server provides a first verification request signal to the first electronic device according to the first transmission request signal, and the first electronic device The first verification request signal transmits the first device preset key to the server, and the server verifies whether the first device preset key matches the first device key to determine whether Agree with the first electricity The sub-device transmits the first type of data to the server; wherein, when the first electronic device sends a second type of data to the server, the first electronic device sends a first timestamp and A second transmission key is encrypted and encoded to generate a first encrypted hash value, and the first electronic device transmits the first encrypted hash value to the server.
其中,在所述第一電子裝置發送所述第二類型資料至所述伺服器前,所述第一電子裝置提供對應所述第二類型資料的一第二傳輸要求訊號至所述伺服器,所述伺服器根據所述第二傳輸要求訊號,產生所述第二傳輸密鑰,所述伺服器將所述伺服器產生的所述第二傳輸密鑰傳送至所述第一電子裝置。 Before the first electronic device sends the second type of data to the server, the first electronic device provides a second transmission request signal corresponding to the second type of data to the server, The server generates the second transmission key according to the second transmission request signal, and the server transmits the second transmission key generated by the server to the first electronic device.
其中,所述伺服器根據一第二時間戳記以及所述第二傳輸密鑰,產生一第二加密雜湊值,所述伺服器比對所述第一加密雜湊值以及所述第二加密雜湊值,以決定是否同意所述第一電子裝置傳輸所述第二類型資料至所述伺服器。 Wherein, the server generates a second encrypted hash value based on a second time stamp and the second transmission key, and the server compares the first encrypted hash value and the second encrypted hash value To decide whether to allow the first electronic device to transmit the second type of data to the server.
其中,所述第一類型資料的機密等級比所述第二類型資料的機密等級為高。 Wherein, the confidentiality level of the first type data is higher than that of the second type data.
其中,所述第一時間戳記以及所述第二時間戳記的一時間差小於一預定時間。 Wherein, a time difference between the first time stamp and the second time stamp is less than a predetermined time.
其中,所述第一時間戳記與所述第二時間戳記相同。 The first time stamp is the same as the second time stamp.
其中,當所述第一電子裝置發送一另一第一類型資料至所述伺服器之前,所述第一電子裝置提供對應所述第一類型資料的一另一第一傳輸要求訊號至所述伺服器,所述伺服器根據所述第一傳輸要求訊號產生一另一第一裝置密鑰,所述伺服器根據所述另一第一傳輸要求訊號提供一第一驗證要求訊號至所述第一電子裝置,所述第一電子裝置根據所述第一驗證要求訊號傳送所述第一裝置預設密鑰至所述伺服器,所述伺服器驗證所述第一裝置預設密鑰是否與所述另一第一裝置密鑰相符合,以決定是否同意所述第一電子裝置傳輸所述第一類型資料至所述伺服器。 Wherein, before the first electronic device sends another first type data to the server, the first electronic device provides another first transmission request signal corresponding to the first type data to the server A server, the server generates another first device key according to the first transmission request signal, and the server provides a first verification request signal to the first according to the other first transmission request signal An electronic device, the first electronic device transmits the first device preset key to the server according to the first verification request signal, the server verifies whether the first device preset key is The key of the other first device matches to determine whether to approve the first electronic device to transmit the first type of data to the server.
其中,所述第一電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器進行通訊。 Wherein, the first electronic device uses Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 to communicate with the server.
其中,所述通訊系統還包括:一第二電子裝置;所述第一電子裝置以及所述第二電子裝置是以藍牙通訊協定4.0或是藍牙通訊協定5.0與所述伺服器以及所述第二電子裝置進行通訊,所述第二電子裝置是利用藍牙通訊協定4.0或是藍牙通訊協定5.0與所述第一電子裝置以及所述伺服器進行通訊。 Wherein, the communication system further includes: a second electronic device; the first electronic device and the second electronic device are based on Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 with the server and the second The electronic device communicates, and the second electronic device uses Bluetooth communication protocol 4.0 or Bluetooth communication protocol 5.0 to communicate with the first electronic device and the server.
有鑑於此,本發明實施例提供了一種利用兩種密鑰的通訊方法,包括:傳送對應一第一類型資料的一第一傳輸要求訊號;提供一第一驗證訊號;根據所述第一驗證訊號,提供一第一裝置預設密鑰;以及驗證是否所述第一裝置預設密鑰與一第一裝置密鑰相符合,以決定是否同意傳送所述第一類型資料。 In view of this, an embodiment of the present invention provides a communication method using two keys, including: transmitting a first transmission request signal corresponding to a first type of data; providing a first verification signal; based on the first verification The signal provides a first device preset key; and verifies whether the first device preset key matches a first device key to decide whether to agree to send the first type of data.
其中,所述通訊方法還包括:傳送對應一第二類型資料的一第二傳輸要求訊號;根據所述第二傳輸要求訊號,產生一第二傳輸密鑰;回傳所述第二傳輸密鑰;根據所述第二傳輸密鑰以及一第一時間戳記產生一第一加密雜湊值;根據所述第二傳輸密鑰以及一第二時間戳記產生一第二加密雜湊值;比對所述第一加密雜湊值以及所述第二加密雜湊值,產生一比對結果;以及根據所述比對結果,決定是否同意傳送所述第二類型資料。 Wherein, the communication method further includes: transmitting a second transmission request signal corresponding to a second type of data; generating a second transmission key according to the second transmission request signal; returning the second transmission key Generating a first encrypted hash value based on the second transmission key and a first time stamp; generating a second encrypted hash value based on the second transmission key and a second time stamp; comparing the first An encrypted hash value and the second encrypted hash value generate a comparison result; and based on the comparison result, decide whether to agree to send the second type of data.
綜上所述,本發明實施例的通訊系統,是利用兩種不同密鑰進行不同類型資料的傳輸,除了針對不同機密等級的資料進行不同加密等級的通訊傳輸,更由於本發明利用的兩種密鑰,僅限當次資料傳輸使用,更使本發明通訊方法的保密等級有所提升。 In summary, the communication system according to the embodiment of the present invention uses two different keys for different types of data transmission. In addition to different encryption levels of data transmission for different confidential levels of data, it is also due to the two The key is only used for the current data transmission, which further improves the security level of the communication method of the present invention.
1‧‧‧通訊系統 1‧‧‧Communication system
10‧‧‧伺服器 10‧‧‧Server
11‧‧‧第一電子裝置 11‧‧‧ First electronic device
12‧‧‧第二電子裝置 12‧‧‧Second electronic device
S100-S105、S200-S207‧‧‧步驟 S100-S105, S200-S207
圖1是本發明實施例的通訊系統的示意圖。 FIG. 1 is a schematic diagram of a communication system according to an embodiment of the invention.
圖2是本發明實施例的第一電子裝置與伺服器利用第一裝置密鑰 進行通訊的示意圖。 FIG. 2 is the first electronic device and the server using the first device key according to an embodiment of the invention Schematic diagram of communication.
圖3是本發明實施例的第一電子裝置與伺服器利用第二傳輸密鑰進行通訊的示意圖。 3 is a schematic diagram of a first electronic device and a server communicating with a second transmission key according to an embodiment of the invention.
以下是通過特定的具體實施例來說明本發明所公開有關“生理檢測裝置”的實施方式,熟悉本領域的技術人員可由本說明書所公開的內容輕易地瞭解本發明的優點與效果。本發明可通過其他不同的具體實施例加以施行或應用,本說明書中的各項細節也可基於不同觀點與應用,在不悖離本發明的精神下進行各種修飾與變更。另外,本發明的附圖僅為簡單示意說明,並非依實際尺寸的描繪,予以聲明。應理解,雖然本文中可能使用術語第一、第二、第三等來描述各種元件等,但這些元件不應受這些術語限制。這些術語乃用以區分一元件與另一元件。另外,有提及數量或其類似者,除非另作說明,否則本發明的應用範疇應不受其數量或其類似者之限制。以下的實施方式將進一步詳細說明本發明的相關技術內容,但所公開的內容並非用以限制本發明的技術範圍。 The following are specific specific examples to illustrate the implementation of the "physiological detection device" disclosed in the present invention. Those skilled in the art can easily understand the advantages and effects of the present invention from the content disclosed in this specification. The present invention can be implemented or applied through other different specific embodiments. Various details in this specification can also be based on different viewpoints and applications, and various modifications and changes can be made without departing from the spirit of the present invention. In addition, the drawings of the present invention are merely schematic illustrations, and are not depicted according to actual dimensions. It should be understood that although the terms first, second, third, etc. may be used herein to describe various elements and the like, these elements should not be limited by these terms. These terms are used to distinguish one element from another. In addition, there are mentioned quantities or the like, and unless otherwise stated, the application scope of the present invention should not be limited by the quantity or the like. The following embodiments will further describe the related technical content of the present invention in detail, but the disclosed content is not intended to limit the technical scope of the present invention.
請參照圖1、圖2以及圖3,圖1是本發明實施例的通訊系統的示意圖。圖2是本發明實施例的第一電子裝置與伺服器利用第一裝置密鑰進行通訊的示意圖。圖3是本發明實施例的第一電子裝置與伺服器利用第二傳輸密鑰進行通訊的示意圖。 Please refer to FIG. 1, FIG. 2 and FIG. 3. FIG. 1 is a schematic diagram of a communication system according to an embodiment of the present invention. 2 is a schematic diagram of the first electronic device and the server communicating with the first device key according to an embodiment of the present invention. 3 is a schematic diagram of a first electronic device and a server communicating with a second transmission key according to an embodiment of the invention.
請參照圖1,在本實施例中,通訊系統1包括一伺服器10、一第一電子裝置11、以及一第二電子裝置12。
Please refer to FIG. 1. In this embodiment, the communication system 1 includes a
第一電子裝置11以及第二電子裝置12分別與伺服器10以一第一通訊協定進行通訊。第一電子裝置11與第二電子裝置12是
以第二通訊協定進行通訊。在本實施例中,通訊系統1可以適用於一智能電網系統中。
The first
在本實施例中,第一電子裝置11以及第二電子裝置12分別是一藍牙通訊裝置。第一電子裝置11、第二電子裝置12可以分別設置在不同的智能電錶或是智能電網的不同電力迴路控制開關中,在本發明中不做限制。
In this embodiment, the first
此外,第一電子裝置11、第二電子裝置12的數量可以根據實際需求進行調整,也就是,通訊系統1可以通訊連接的電子裝置數量,可以根據實際需求進行調整、設計,在本發明中不做限制。
In addition, the numbers of the first
在本實施例中,第一通訊協定包括:一藍牙通訊協定4.0、一藍牙通訊協定5.0、一無線保真通訊協定(Wifi)、一LoRa通訊協定、一Sigfox通訊協定、一第四代移動通訊技術通訊協定(4G)或是一第五代移動通訊技術通訊協定(5G),可以根據實際需求進行調整、設計,在本發明中,不做限制。第二通訊協定包括一藍牙通訊協定4.0、一藍牙通訊協定5.0、一無線保真通訊協定(Wifi)、一LoRa通訊協定、一Sigfox通訊協定、一第四代移動通訊技術通訊協定(4G)或是一第五代移動通訊技術通訊協定(5G),可以根據實際需求進行調整、設計,在本發明中,不做限制。 In this embodiment, the first communication protocol includes: a Bluetooth communication protocol 4.0, a Bluetooth communication protocol 5.0, a wireless fidelity communication protocol (Wifi), a LoRa communication protocol, a Sigfox communication protocol, and a fourth generation mobile communication The technology communication protocol (4G) or a fifth-generation mobile communication technology communication protocol (5G) can be adjusted and designed according to actual needs. In the present invention, there is no limitation. The second communication protocol includes a Bluetooth communication protocol 4.0, a Bluetooth communication protocol 5.0, a wireless fidelity communication protocol (Wifi), a LoRa communication protocol, a Sigfox communication protocol, a fourth generation mobile communication technology communication protocol (4G) or It is a fifth-generation mobile communication technology communication protocol (5G), which can be adjusted and designed according to actual needs. In the present invention, there is no limitation.
在本實施例中,第一電子裝置11、第二電子裝置12分別是以藍牙通訊協定與伺服器10進行通訊。
In this embodiment, the first
其中,第一電子裝置具有一第一裝置預設密鑰,第一電子裝置11與伺服器10傳輸第一類型資料的通訊方法包括下列步驟:
The first electronic device has a first device preset key, and the communication method between the first
提供一第一傳輸要求訊號(步驟S100);提供一驗證要求訊號(步驟S101);根據第一傳輸要求訊號,產生一第一裝置密鑰(步驟S102);根據驗證要求訊號,提供第一裝置預設密鑰至伺服器(步驟S103);校驗第一裝置預設密鑰與第一裝置密鑰是否相符合(步驟S104);提供一校驗結果,以決定第一電子裝置是否傳輸第一類型資料(步驟S105)。 Provide a first transmission request signal (step S100); provide a verification request signal (step S101); generate a first device key based on the first transmission request signal (step S102); provide a first device based on the verification request signal Preset key to the server (step S103); verify that the first device preset key is consistent with the first device key (step S104); provide a verification result to determine whether the first electronic device transmits the first key One type of material (step S105).
在本實施例中,第一電子裝置11在傳輸資料之前,會先檢測資料類型,也就是第一電子裝置11會在傳輸第一類型資料或第二類型資料之前,首先會檢測第一類型資料或第二類型資料適合利用哪一種密鑰、傳輸方式進行傳輸,也就是,在本實施例中,會根據資料的機密等級分類進行密鑰的選擇。
In this embodiment, the first
在步驟S100中,第一電子裝置11在傳輸第一類型資料之前,會先提供對應第一類型資料的一第一傳輸要求訊號至伺服器10。而後,伺服器10則會執行如步驟S101中所述的,伺服器10根據第一傳輸要求訊號,提供一驗證要求訊號至第一電子裝置11。
In step S100, before transmitting the first type of data, the first
在步驟S102中,伺服器10會根據第一傳輸要求訊號,產生對應一第一裝置密鑰。
In step S102, the
在步驟S103中,第一電子裝置11會根據驗證要求訊號提供第一裝置預設密鑰至伺服器10。在本實施例中,第一裝置預設密鑰儲存在第一電子裝置11中,而且第一裝置預設密碼是被隔離儲存,無法輕易被更改。
In step S103, the first
在步驟S104,伺服器10會對第一電子裝置11傳送的第一裝置預設密鑰與伺服器10根據第一傳輸要求訊號而產生的第一裝置密鑰進行校驗,以確認第一裝置預設密鑰與第一裝置密鑰是否相符合,並且產生一校驗結果。
In step S104, the
在步驟S105中,伺服器10會提供一校驗結果至第一電子裝置11,以決定第一電子裝置11是否傳輸第一類型資料。若校驗結果為相符合,則第一電子裝置11開始傳輸第一類型資料,若校驗結果為不相符,則第一電子裝置11則不傳輸第一類型資料。在本實施例中,第一類型資料是具有較高機密等級的資料。
In step S105, the
在本實施例中,當第一電子裝置11發送一另一第一類型資料至伺服器10之前,第一電子裝置11提供對應另一第一類型資料的一另一第一傳輸要求訊號至伺服器10,伺服器10根據另一第一傳輸要求訊號產生一另一第一裝置密鑰,伺服器10根據另一第一
傳輸要求訊號提供一第一驗證要求訊號至第一電子裝置11,第一電子裝置11根據第一驗證要求訊號傳送第一裝置預設密鑰至伺服器10,伺服器10校驗第一裝置預設密鑰是否與所述另一第一裝置密鑰相符合,以決定第一電子裝置是否傳輸第一類型資料至伺服器10。
In this embodiment, before the first
請參照圖3,第一電子裝置11與伺服器10傳輸第二類型資料的通訊方法包括下列步驟:
Referring to FIG. 3, the communication method for the first
提供一第二傳輸要求訊號(步驟S200);產生一第二傳輸密鑰(步驟S201);提供第二傳輸密鑰至第一電子裝置(步驟S202);根據第一時間戳記與第二傳輸密鑰產生一第一加密雜湊值(步驟S203);提供第一加密雜湊值至伺服器(步驟S204);根據一第二時間戳記與第二傳輸密鑰,產生一第二加密雜湊值(步驟S205);比對第一加密雜湊值以及第二加密雜湊值(步驟S206);以及提供一比對結果至第一電子裝置,決定第一電子裝置是否傳輸第二類型資料(步驟S207)。 Provide a second transmission request signal (step S200); generate a second transmission key (step S201); provide a second transmission key to the first electronic device (step S202); according to the first time stamp and the second transmission password The key generates a first encrypted hash value (step S203); provides the first encrypted hash value to the server (step S204); generates a second encrypted hash value based on a second time stamp and a second transmission key (step S205) ); compare the first encrypted hash value and the second encrypted hash value (step S206); and provide a comparison result to the first electronic device to determine whether the first electronic device transmits the second type of data (step S207).
在本實施例中,第一電子裝置11在傳輸資料之前,會先檢測資料類型,也就是第一電子裝置11會在傳輸第一類型資料或第二類型資料之前,首先會檢測第一類型資料或第二類型資料適合利用哪一種密鑰、傳輸方式進行傳輸,也就是,在本實施例中,會根據資料的機密等級分類進行密鑰的選擇。
In this embodiment, the first
在步驟S200中,第一電子裝置11在傳輸第二類型資料之前,會先提供對應第二類型的一第二傳輸要求訊號至伺服器10。
In step S200, before transmitting the second type of data, the first
在步驟S201中,伺服器10會根據第二傳輸要求訊號,產生一第二傳輸密鑰,在本實施例中,第二傳輸密鑰是一次性密鑰,也就是僅限此次傳輸要求可以使用。在別次傳輸要求,則需要一新的第二傳輸密鑰。
In step S201, the
在步驟S202中,伺服器10會提供對應第二傳輸要求訊號的第二傳輸密鑰至第一電子裝置11。
In step S202, the
在步驟S203中,第一電子裝置11會根據第一時間戳記與第二傳輸密鑰產生一第一加密雜湊值。
In step S203, the first
在步驟S204中,第一電子裝置11會提供第一加密雜湊值至伺服器10。
In step S204, the first
在步驟S205中,伺服器10根據一第二時間戳記與第二傳輸密鑰,產生一第二加密雜湊值。在本實施例中,在步驟S203以及步驟S205中的第一加密雜湊值以及第二加密雜湊值,是利用第二傳輸密鑰以及不同的時間戳記進行雜湊運算而得到的。
In step S205, the
在步驟S206中,伺服器10會比對第一加密雜湊值以及第二加密雜湊值是否相符,以產生一比對結果。
In step S206, the
在步驟207中,伺服器10會提供比對結果至第一電子裝置11,以決定第一電子裝置11是否傳輸第二類型資料。其中,若比對結果是相符合的,則第一電子裝置11進行第二類型資料的傳輸,若比對結果是不相符的,則第一電子裝置11就不會進行第二類型資料的傳輸。
In step 207, the
在本實施例中,第一時間戳記以及第二時間戳記的一時間差小於一預定時間。其中,預定時間例如是5秒或是10秒。在其他實施例中,第一時間戳記與第二時間戳記也可以是相同的時間。 In this embodiment, a time difference between the first time stamp and the second time stamp is less than a predetermined time. The predetermined time is, for example, 5 seconds or 10 seconds. In other embodiments, the first time stamp and the second time stamp may also be the same time.
在本實施例中,第一類型資料的機密等級比第二類型資料的機密等級為高。也就是,第一類型資料可以是電力使用資料,而第二類型資料可以是通知訊號、警告訊號或是其他保護訊號,在本發明中不做限制。 In this embodiment, the confidentiality level of the first type data is higher than that of the second type data. That is, the first type of data may be power usage data, and the second type of data may be notification signals, warning signals, or other protection signals, which are not limited in the present invention.
綜上所述,本發明實施例的通訊系統,是利用兩種不同密鑰進行不同類型資料的傳輸,除了針對不同機密等級的資料進行不同加密等級的通訊傳輸,更由於本發明利用的兩種密鑰,僅限當次資料傳輸使用,更使本發明通訊方法的保密等級有所提升。 In summary, the communication system according to the embodiment of the present invention uses two different keys for different types of data transmission. In addition to different encryption levels of data transmission for different confidential levels of data, it is also due to the two The key is only used for the current data transmission, which further improves the security level of the communication method of the present invention.
以上所述僅為本發明之較佳實施例,非意欲侷限本發明的專利保護範圍,故舉凡運用本發明說明書及圖式內容所為的等效變 化,均同理皆包含於本發明的權利保護範圍內,合予陳明。 The above are only the preferred embodiments of the present invention, and are not intended to limit the scope of patent protection of the present invention, so the equivalent changes in the description and drawings of the present invention are used. Both of them are included in the scope of protection of the rights of the present invention, and are given to Chen Ming.
1‧‧‧通訊系統 1‧‧‧Communication system
10‧‧‧伺服器 10‧‧‧Server
11‧‧‧第一電子裝置 11‧‧‧ First electronic device
12‧‧‧第二電子裝置 12‧‧‧Second electronic device
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107125332A TWI682656B (en) | 2018-07-23 | 2018-07-23 | Communication system using two kinds of keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW107125332A TWI682656B (en) | 2018-07-23 | 2018-07-23 | Communication system using two kinds of keys |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI682656B true TWI682656B (en) | 2020-01-11 |
TW202008746A TW202008746A (en) | 2020-02-16 |
Family
ID=69942522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW107125332A TWI682656B (en) | 2018-07-23 | 2018-07-23 | Communication system using two kinds of keys |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI682656B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030210789A1 (en) * | 2002-01-17 | 2003-11-13 | Kabushiki Kaisha Toshiba | Data transmission links |
US20090204806A1 (en) * | 2006-07-03 | 2009-08-13 | Kouichi Kanemura | Certifying device, verifying device, verifying system, computer program and integrated circuit |
CN101599835A (en) * | 2009-07-14 | 2009-12-09 | 北京坚石诚信科技有限公司 | Signature device and method for executing operating instructions thereof |
US20140129834A1 (en) * | 2012-11-02 | 2014-05-08 | Jacob Andrew Brill | Providing User Authentication |
-
2018
- 2018-07-23 TW TW107125332A patent/TWI682656B/en not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030210789A1 (en) * | 2002-01-17 | 2003-11-13 | Kabushiki Kaisha Toshiba | Data transmission links |
US20090204806A1 (en) * | 2006-07-03 | 2009-08-13 | Kouichi Kanemura | Certifying device, verifying device, verifying system, computer program and integrated circuit |
CN101599835A (en) * | 2009-07-14 | 2009-12-09 | 北京坚石诚信科技有限公司 | Signature device and method for executing operating instructions thereof |
US20140129834A1 (en) * | 2012-11-02 | 2014-05-08 | Jacob Andrew Brill | Providing User Authentication |
Also Published As
Publication number | Publication date |
---|---|
TW202008746A (en) | 2020-02-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108235806B (en) | Method, device and system for safely accessing block chain, storage medium and electronic equipment | |
US10075820B2 (en) | Secure broadcast beacon communications | |
CN111343613B (en) | Method and apparatus for establishing secure low energy wireless communications in a process control system | |
CN104094267B (en) | Method, apparatus and system for secure sharing of media content from a source device | |
KR101410764B1 (en) | Apparatus and method for remotely deleting important information | |
KR20180119201A (en) | Electronic device for authentication system | |
US11711205B2 (en) | Unified secure device provisioning | |
CN116671062A (en) | Remote management of hardware security modules | |
KR20210128418A (en) | Resource request method, device and storage medium | |
US11804972B2 (en) | Fluid meter communicating with an electromechanical valve | |
CN114745180B (en) | Access authentication method, device and computer equipment | |
JP3224994U (en) | Communication system using two keys | |
KR101848300B1 (en) | METHOD FOR OPERATING COMMUNICATION CLIENT INSTALLED IN IoT DEVICE AND IoT DEVICE INCLUDING THE CLIENT | |
US12045600B2 (en) | Method for upgrading IoT terminal device and electronic device thereof | |
CN109960935B (en) | Method, device and storage medium for determining trusted state of TPM (trusted platform Module) | |
TWI682656B (en) | Communication system using two kinds of keys | |
CN117294776A (en) | Controller trusted data transmission system and method | |
CN112929871A (en) | OTA upgrade package acquisition method, electronic device and storage medium | |
KR20100043799A (en) | Method for moving secret data between mobile terminal based on mobile trusted module | |
US20220368522A1 (en) | Bluetooth peripheral and central apparatuses and verification method | |
KR20240045160A (en) | Method and system for providing encrypted and authenticated firmware with root-of-trust based security | |
KR20190115489A (en) | IOT equipment certification system utilizing security technology | |
KR20190108888A (en) | Electronic device and certification method in electronic device | |
KR102118956B1 (en) | System and method for authentication | |
EP4270873A1 (en) | Embedded system support for secure time-aware authentication, acting and sensing devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |