[go: up one dir, main page]

CN108566276A - key updating method and device, portable intelligent device - Google Patents

key updating method and device, portable intelligent device Download PDF

Info

Publication number
CN108566276A
CN108566276A CN201810373760.5A CN201810373760A CN108566276A CN 108566276 A CN108566276 A CN 108566276A CN 201810373760 A CN201810373760 A CN 201810373760A CN 108566276 A CN108566276 A CN 108566276A
Authority
CN
China
Prior art keywords
key
parameter
updating
network
network node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810373760.5A
Other languages
Chinese (zh)
Inventor
林凡
成杰
张振华
张秋镇
杨峰
李盛阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GCI Science and Technology Co Ltd
Original Assignee
GCI Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GCI Science and Technology Co Ltd filed Critical GCI Science and Technology Co Ltd
Priority to CN201810373760.5A priority Critical patent/CN108566276A/en
Publication of CN108566276A publication Critical patent/CN108566276A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention relates to a kind of key updating methods, including step:Obtain the key updating mark of current key;The key updating mark is the key updating mark that each apparatus for network node random time generates;Obtain local current key and Network ID;The current key is updated according to key updating mark, current key and Network ID by key updating algorithm;Key updating mark is broadcasted to the current key for triggering each apparatus for network node according to each apparatus for network node of key updating mark synchronized update to each apparatus for network node.Above-mentioned key updating method makes each apparatus for network node realize the autonomous synchronized update for carrying out random time to the key of itself, improves the safety and reliability of key updating, also improves the security reliability of information transmission.A kind of key update device, portable intelligent device, portable intelligent device management system and computer readable storage medium are also provided.

Description

Key updating method and device and portable intelligent device
Technical Field
The present invention relates to the field of information security technologies, and in particular, to a key updating method, a key updating apparatus, a portable intelligent device management system, and a computer-readable storage medium.
Background
With the increase of the level of intelligence, intelligent devices have been applied to various technical fields, for example, wearable intelligent devices have been widely applied to data monitoring in fields including military defense, environmental monitoring, medical health, industry, and high-risk fields. Because the network structure of the intelligent device management system is open, the network security of the intelligent device management system is poor due to some characteristics of the intelligent device management system, so that lawbreakers can easily eavesdrop, intercept or forge information transmitted through the network.
The traditional technology manages intelligent equipment through a trusted network architecture of ternary peer authentication, and based on multiple times of transmission and transfer of a trusted verification mechanism, the technology plays a supporting role in the problems of communication and network security of a legal terminal accessing a legal network, however, the technology has the management problem of a digital certificate, for example, each equipment always uses a preset digital certificate for identity verification, which easily causes an attacker to carry out collision attack on the digital signature of the certificate, and if the equipment requests a trusted third party to update the digital certificate and carries out transmission of the digital certificate through the network, the attacker is easily caused to eavesdrop in the transmission process of the digital certificate, once the eavesdrop obtains the digital certificate directly encrypted by each equipment unit, system information can be mastered by the attacker, and the security of information transmission is reduced.
Disclosure of Invention
In view of the above, it is necessary to provide a key update method, a key update apparatus, a portable smart device management system, and a computer-readable storage medium, which address the problem of low security of information transmission in the conventional art.
In one embodiment, there is provided a key update method, including the steps of:
acquiring a key updating mark of a current key; the key updating mark is a key updating mark generated by each network node device at random time;
acquiring the local current secret key and the network identification code; updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm;
and broadcasting the key updating mark to each network node device, so as to trigger each network node device to synchronously update the current key of each network node device according to the key updating mark.
According to the key updating method, the key updating mark of the current key generated by each network node device at random time is obtained, the local current key and the local network identification code are obtained, the current key is updated according to the key updating mark, the current key and the network identification code through a key updating algorithm, the key updating mark is broadcasted, each network node device is triggered to synchronously update the respective current key according to the key updating mark, and each network node device is enabled to independently and synchronously update the own key at random time, so that the security and the reliability of key updating are improved, and the security and the reliability of information transmission are also improved.
In one embodiment, the step of obtaining the key update flag of the current key comprises:
extracting a time random number from a random number space pre-stored locally; setting the key updating time of the current key according to the time random number; and generating a key updating mark of the current key according to the key updating time.
In one embodiment, the step of obtaining the key update flag includes:
and receiving the key updating marks broadcasted by each network node device.
In one embodiment, the step of updating the current key according to the key update flag, the current key and the network identification code by using a key update algorithm includes:
using the current key as a seed key for updating the current key; acquiring local key generation parameters and key updating parameters; generating an assisting key corresponding to the key updating mark according to the key generation parameter, the key updating parameter, the network identification code and the key updating mark by using an assisting key algorithm; and generating an updating key corresponding to the key updating mark according to the seed key, the assisting key, the key generation parameter and the network identification code by using a key updating algorithm.
In one embodiment, the step of obtaining the local current key includes:
acquiring local key generation parameters and an initial key; generating a local initial seed key according to the key generation parameter, the initial key and the network identification code by a key initialization algorithm; inquiring a historical key updating mark; and acquiring the current key according to the initial seed key and a historical key updating mark.
In one embodiment, the method further comprises the steps of:
acquiring initialization node parameters of each network node device; wherein the initializing node parameters comprise: the network identification code, the key generation parameter, the initial key and the key update parameter of each network node device; the key generation parameters comprise a plaintext space, a ciphertext space and a random number space; the plaintext space and the ciphertext space are used for updating the current key through the key updating algorithm, and the random number space is used for setting the random time for generating the key updating mark; and calculating the public key of each network node device according to the initialization node parameters.
In one embodiment, the step of obtaining initialization node parameters of the network node devices includes:
receiving a parameter inquiry command sent by the network node equipment; wherein the parameter query command carries an initialization node parameter of the network node device and a command identifier of the parameter query command; the command identifier is used for identifying the command format of the parameter inquiry command; carrying out validity check on the command format of the parameter inquiry command according to the command identifier; if the command format is the legal inquiry command format, extracting the initialization node parameter of the network node equipment from the parameter inquiry command and storing the initialization node parameter locally, and generating a parameter response command corresponding to the initialization node parameter by using the local initialization node parameter and feeding the parameter response command back to the network node equipment; otherwise, discarding the parameter inquiry command;
the step of calculating the public key of each network node device according to the initialization node parameters comprises:
calculating the initial value of the public key of each network node device by using a public key initialization algorithm according to the initialization node parameters of each network node device; and generating the public key of each network node device by using a public key generation algorithm according to the public key initial value and the initialization node parameter of each network node device.
In one embodiment, there is provided a key updating apparatus including:
the acquisition module is used for acquiring a key updating mark of a current key; the key updating mark is a key updating mark generated by each network node device at random time;
the updating module is used for acquiring the local current secret key and the local network identification code; updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm;
a broadcasting module, configured to broadcast the key update flag to each network node device, and configured to trigger each network node device to synchronously update the current key of each network node device according to the key update flag.
According to the key updating device, the key updating mark of the current key generated by each network node device at random time is obtained through the obtaining module, the local current key and the local network identification code are obtained through the updating module, the current key is updated according to the key updating mark, the current key and the network identification code through the key updating algorithm, the key updating mark is broadcasted through the broadcasting module, each network node device is triggered to synchronously update the respective current key according to the key updating mark, each network node device is enabled to independently and synchronously update the own key at random time, the security and the reliability of key updating are improved, and the security and the reliability of information transmission are also improved.
In one embodiment, a portable smart device is provided that updates a key using a key update method as described in any one of the above embodiments.
The portable intelligent device updates the key by adopting the key updating method according to any one of the embodiments, so that the portable intelligent device can independently update the key of the portable intelligent device at random time, the security and the reliability of key updating are improved, and the security and the reliability of information transmission by using the updated key in the portable intelligent device are also improved.
In one embodiment, there is provided a portable smart device management system comprising: the system comprises portable intelligent equipment, a network service management platform and an authentication server which are in communication connection in sequence; wherein,
the portable intelligent device, the network service management platform and the authentication server all adopt the key updating method to update the key.
The portable intelligent device, the network service management platform and the authentication server in the portable intelligent device management system all adopt the key updating method described in any embodiment to update respective keys, so that each network node device in the portable intelligent device management system can perform random time autonomous synchronous updating on the respective keys, the security and the reliability of the key updating of each network node device of the portable intelligent device management system are improved, and the communication security and the reliability of the portable intelligent device management system are ensured.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements a key update method as described in any one of the above embodiments.
The computer readable storage medium improves the security and reliability of key updating and also improves the security and reliability of information transmission through the stored computer program.
Drawings
FIG. 1 is a diagram of an application environment of a rekeying method in one embodiment;
FIG. 2 is a flow diagram illustrating a method for rekeying in one embodiment;
FIG. 3 is a timing diagram of the public key generation phase in one embodiment;
FIG. 4 is a block diagram of a key update apparatus according to an embodiment;
FIG. 5 is a network architecture diagram of a portable intelligent device management system in one embodiment;
FIG. 6 is a flowchart illustrating a key update method according to another embodiment;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment;
fig. 8 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The key updating method provided by the present invention can be applied to the application environment shown in fig. 1, where fig. 1 is an application environment diagram of the key updating method in one embodiment. The application environment shown in fig. 1 is a network system model of a trusted network architecture based on ternary peer-to-peer authentication, and the network system may include a plurality of network node devices, such as an authentication server 100, a network service management platform 200, and a network request device 300, and the network system generally adds a peer-to-peer identity verification function in the network service management platform 200 and the network request device 300 of each network node device, and introduces the authentication server 100 to perform identity information authentication on the network service management platform 200 and the network request device 300, and peer-to-peer identity verification of multiple handshakes is usually required when a connection is initially established between the three devices.
In a network system of an already established trusted network architecture, a sub-network node device may communicate with its parent network node device, with which the sub-network node device is mutually trusted. The network request device 300 may communicate with the network service management platform 200 and send corresponding data to the network service management platform 200, the network service management platform 200 may receive the data and may forward the data to the authentication server 100, for example, the notebook computer 310 in the network request device 300 may send the data to the first network service management platform 210, the first network service management platform 210 may forward the data to the authentication server 100, and the authentication server 100 may send the data to the personal digital assistant 330 in the network request device 300 through the second network service management platform 220.
The network request device 300 may be, but is not limited to, various notebook computers 310, tablet computers 320, personal digital assistants 330, personal computers 340, smart phones, portable wearable smart devices, and the like, and the network service management platform 200 and the authentication server 100 may be implemented by independent servers or a server cluster formed by a plurality of servers.
In an embodiment, a key updating method is provided, as shown in fig. 2, fig. 2 is a schematic flow chart of the key updating method in an embodiment, the method may be applied to any one of the network node devices, such as the authentication server 100, the network service management platform 200 and the network request device 300 in fig. 1, and the following description takes the method as an example applied to the network request device 300, and the key updating method may include the following steps:
step S101, obtaining the key updating mark of the current key.
The step is mainly that the local device obtains the key updating mark to update the communication key currently used by the local device.
In this step, the current key is a communication key currently used by the local device, and is a key used before key update, and includes a public key currently used by the local device for communication or a private key paired with the public key, and for example, the network request device 300 is a communication key currently used by the network request device 300; the key update flag refers to a flag for triggering the local device to perform key update, and may be an update sequence number for indicating the number of times of key update, and is used to indicate that the current time is the number of times of key update, where the key update flag may be generated at random time by any node device in the network system where the local device is located, and the authentication server 100, the network service management platform 200, or the network request device 300 may generate the key update flag at random time.
Step S102, obtaining a local current secret key and a network identification code; and updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm.
In this step, the network identification code is a unique identification code in the network system where the local device is located, and can be used to identify the device in the network system.
The network request device 300 may obtain the currently used communication key and the local network identification codebook step mainly uses the current key as a seed key for updating the current key, and updates the communication key according to the key update flag, the current key and the network identification code by using a key update algorithm, for example, the network request device 300 may use the step to autonomously update the communication key by using the current communication private key as the seed private key.
Step S103, broadcasting the key update flag to each network node device, for triggering each network node device to synchronously update the current key of each network node device according to the key update flag.
After a network node device autonomously updates its communication key to obtain an updated key, the network node device may broadcast a key update flag corresponding to the updated key through a network system where the network node device is located, and send the key update flag to the other network node devices, so as to trigger each network node device to autonomously update its communication key synchronously according to the key update flag.
After the notebook computer 310 in the network request device 300 updates its current key with the key update flag, the first network service management platform 210 may broadcast its key update flag for updating the key to other network node devices, such as the authentication server 100 and the second network service management platform 220, and trigger each network node device to autonomously update its current communication key, so as to ensure the security and reliability of information transmission in the system network.
According to the key updating method, the key updating mark of the current key generated by each network node device at random time is obtained, the local current key and the local network identification code are obtained, the current key is updated according to the key updating mark, the current key and the network identification code through a key updating algorithm, the key updating mark is broadcasted, each network node device is triggered to synchronously update the respective current key according to the key updating mark, and each network node device is enabled to independently and synchronously update the own key at random time, so that the security and the reliability of key updating are improved, and the security and the reliability of information transmission are also improved.
In one embodiment, the step of obtaining the key update flag of the current key in step S101 may include:
extracting a time random number from a random number space pre-stored locally; setting the key updating time of the current key according to the time random number; and generating a key updating mark of the current key according to the key updating time.
The embodiment mainly determines the update time of the current key through a random number space prestored in the local device. Each network node device of the network system can generate a random number space when the network system is initialized, each network node device can randomly extract a random number from the random number space, a time constant is determined by using the random number, the next updating time of the current key is set according to the time constant, the time constant can also be used as the updating time of the current key, when the updating time arrives, a key updating mark of the current key is generated, the key updating mark can be a serial number representing the updating times of the key, and if the last updating is the 4 th updating, when the updating time arrives, 5 is generated as the key updating mark.
By adopting the technical scheme of the embodiment, each network node device can set the update time of the current key through the random number space pre-stored by the network node device, and generate the key update mark of the current key, so that each network node device can independently generate the key update mark at random time for updating the current key, the security and the reliability of data transmission are further improved, and the information encrypted and transmitted by each network node device in the corresponding network system is ensured not to be easily intercepted.
In one embodiment, the step of obtaining the key update flag in step S101 may include:
and receiving the key updating marks broadcasted by each network node device.
In this embodiment, the local device may obtain the key update flag from each network node device of the network system, and after updating the current key of each network node device of the network system to obtain the updated key, the network node device of the network system broadcasts the key update flag corresponding to the updated key, such as the serial number of the current key update, to other network node devices of the network system, so that the local device may update the current key of the local device according to the key update flag by receiving the key update flag broadcast by other network node devices, thereby ensuring timeliness of key update and facilitating improvement of information transmission security of the network system.
In one embodiment, the step of updating the current key according to the key update flag, the current key and the network identification code by using the key update algorithm in step S102 may include:
using the current key as a seed key for updating the current key; acquiring local key generation parameters and key updating parameters; generating an assisting key corresponding to the key updating mark according to the key generation parameter, the key updating parameter, the network identification code and the key updating mark by using an assisting key algorithm; and generating an updating key corresponding to the key updating mark according to the seed key, the assisting key, the key generation parameter and the network identification code by using a key updating algorithm.
In this embodiment, two different sets of arrays may be respectively used as the key generation parameter and the key update parameter, the key generation parameter is mainly used for generating the assist key and generating the update key, and the key update parameter is mainly used for generating the assist key. The local device may generate two different sets of data as the key generation parameter and the key update parameter when the network system performs parameter initialization, and locally store the key generation parameter and the key update parameter.
When the current key needs to be updated, the local pre-stored key generation parameter and key update parameter can be obtained, an assist key corresponding to the key update flag is generated according to the key generation parameter, the key update parameter and the network identification code and the key update flag obtained in step S101 through an assist key algorithm, and the seed key, the assist key, the key generation parameter and the network identification code generate an update key corresponding to the key update flag by using the key update algorithm.
According to the technical scheme of the embodiment, the current key before key updating is used as the seed key for key updating, the local pre-stored key generation parameter and the local pre-stored key update parameter are used for generating the assisting key corresponding to the key updating mark through the key assisting algorithm, the generated seed key and the assisting key are used for updating the current key through the key updating algorithm, and the updating key corresponding to the key updating mark is obtained, so that each network node device can perform key updating processing according to the current key and the key updating mark, the situation that the key is easily leaked by sending a key updating request to the authentication server and receiving updating information directly sent by the authentication server is avoided, the current key is updated, and the safety and reliability of information communication of the network system are improved.
In one embodiment, the step of obtaining the local current key in step S102 further includes:
acquiring local key generation parameters and an initial key; generating a local initial seed key according to the key generation parameter, the initial key and the network identification code by a key initialization algorithm; inquiring a historical key updating mark; and acquiring the current key according to the initial seed key and the historical key updating mark.
In this embodiment, the key generation parameter and the initial key may be generated by the local device according to the system and the set security parameter, when the local device is started, the key generation parameter may be an array, and the initial key may be an initial key initially allocated by the network system where the local device is located and used for network system communication.
In this embodiment, a local device, such as the authentication server 100, may obtain a key generation parameter and an initial key generated by local initialization, and generate an initial seed key by using a key initialization algorithm on the local key generation parameter, the initial key and a network identification code; the authentication server 100 may query a historical key update flag, where the historical key update flag is a flag used to instruct each network node device to perform key update in the network system, and after obtaining the historical key update flag, the authentication server 100 may calculate a current key through a key update algorithm according to the initial seed key and the historical key update flag.
By adopting the technical scheme for acquiring the local current key in the embodiment, the local device can inquire the key used in each key updating stage according to the initial key and the historical key updating mark, and can also calculate the currently used key, thereby ensuring the reliability of data transmission and further improving the reliability of a network system.
In an embodiment, the key updating method according to any of the above embodiments may further include the following steps:
acquiring initialization node parameters of each network node device; and calculating the public key of each network node device according to the initialization node parameter.
In this embodiment, the public key of the corresponding network node device is calculated according to the initialization node parameter of each network node device. The initialization node parameter may include a network identification code, a key generation parameter, an initial key, and a key update parameter of each network node device in the network system, where the key generation parameter may include a plaintext space, a ciphertext space, and a random number space, where the plaintext space and the ciphertext space may be used for the local device to update the current key through a key update algorithm, and the random number space may be used for the local device to set a random time for generating a key update flag, for example, the authentication server 100 may select a random number from the random number space as an update time of the next key.
In the network system, each network node device, such as the authentication server 100, may obtain the initialization node parameters of other network node devices, for example, the initialization node parameters of each network node device may be obtained in a form of sending a parameter query command, and a public key of the network node device is generated according to the initialization node parameters of the network node device through a locally pre-stored public key generation algorithm.
According to the technical scheme of the embodiment, the communication public key of each network node device can be calculated by acquiring the initialization parameter of each network node device of the network system, so that a basis for mutual communication is provided for each network node device in the network system.
In an embodiment, further, the step of acquiring initialization node parameters of each network node device in the above embodiments may include:
receiving a parameter inquiry command sent by network node equipment; carrying out validity check on the command format of the parameter inquiry command according to the command identifier; if the command format is the legal inquiry command format, extracting the initialization node parameters of the network node equipment from the parameter inquiry command, locally storing the initialization node parameters, and generating a parameter response command corresponding to the initialization node parameters by using the local initialization node parameters to feed back to the network node equipment; otherwise, the parameter query command is discarded.
In this embodiment, each network node device of the network system may send a local initialization node parameter to another network node device or receive an initialization node parameter of another network node device by sending a parameter query command and a feedback parameter response command.
The parameter query command carries initialization node parameters of the network node device, and the parameter query command may also carry a command identifier for identifying a command format of the parameter query command, for example, if the parameter query command is a command for querying initialization node parameters of the local device, the command identifier may be used for identifying an arrangement format of the parameters carried by the parameter query command, and the command format may be preset by a network system in which the network node device is located.
The local equipment can receive a parameter inquiry command sent by the network node equipment, carry out validity check on the parameter inquiry command according to a command identifier in the parameter inquiry command, check whether the parameter inquiry command is a preset command in an arrangement format, if so, determine that the parameter inquiry command is a legal parameter inquiry command, extract an initialization node parameter of the network node equipment from the parameter inquiry command, locally store the initialization node parameter, convert the local initialization node parameter into a corresponding parameter response command, so that the parameter response command carries the local initialization node parameter and the command identifier, and feed the parameter response command back to the network node equipment; if the parameter inquiry command is judged not to be a legal parameter inquiry command, the data of the parameter inquiry command can be discarded.
To more clearly illustrate the technical solution of the foregoing embodiment, referring to fig. 3, fig. 3 is a timing diagram of a public key generation phase in an embodiment, where a method for obtaining initialization node parameters for generating a public key of a corresponding network node device in the foregoing embodiment may include the following steps:
s201, the network request device may send a parameter query command carrying an initialization parameter of the network request device to the network service management platform, and is configured to send the initialization node parameter of the network request device to the authentication server through the network service management platform and query the initialization node parameter of the authentication server.
S202, after receiving the parameter query command, the network service management platform may perform validity check on the parameter query command, if the check result is illegal, discard the received parameter query command and disconnect the connection with the network request device, if the check result is legal, identify and extract the initialized network node parameter of the network request device from the parameter query command, and generate a parameter query command for performing parameter query on the authentication server, where the parameter query command carries the initialized network node parameters of the network service management platform and the network request device, and send the parameter query command to the authentication server.
S203, the authentication server can carry out validity check on the parameter inquiry command after receiving the parameter inquiry command, and if the check result is illegal, the authentication server can discard the received parameter inquiry command and disconnect the connection with the network service management platform; if the network service request equipment is legal, respectively storing the initialized network node parameters of the network service management platform and the network request equipment, constructing a parameter response command to the network service management platform, carrying the initialized node parameters of the authentication server by the parameter response command, and feeding back the parameter response command to the network service management platform.
S204, after receiving the parameter response command, the network service management platform can carry out validity check on the parameter response command, if the check result is illegal, the network service management platform discards the parameter response command and judges that the authentication of the authentication server is unsafe; if the verification result is legal, storing the initialization node parameters of the authentication server; constructing a parameter response command for the network request equipment, wherein the parameter response command carries an initialization node parameter of the authentication server, feeding the parameter response command back to the network request equipment, and the network request equipment can carry out validity check on the parameter response command; and if the verification result is legal, storing the initialization node parameters of the authentication server in the parameter response command.
According to the technical scheme of the embodiment, the initialization node parameters of the corresponding network node equipment are obtained in the form of sending the parameter inquiry command, and in the inquiry process, the validity of the inquiry command is verified, so that the accuracy of calculating the public key of each network node equipment can be ensured, and the communication public key of each network node equipment is accurately calculated, which is favorable for ensuring the safety and reliability of network system communication.
In an embodiment, the step of calculating the public key of each network node device according to the initialization node parameter in the above embodiments further includes:
calculating the initial value of the public key of each network node device by using a public key initialization algorithm according to the initialization node parameters of each network node device; and generating the public key of each network node device by using a public key generation algorithm according to the public key initial value and the initialization node parameter of each network node device.
In this embodiment, after the initialization node parameter of the network node device is extracted by the local device, the initial value of the public key of the network node device may be calculated by using a local pre-stored public key initialization algorithm, and the public key of the corresponding network node device is generated by using the calculated initial value of the public key and the initialization node parameter of the network node device through a local pre-stored public key generation algorithm.
In an embodiment, a key update apparatus is provided, and referring to fig. 4, fig. 4 is a block diagram illustrating a structure of the key update apparatus in an embodiment, where the key update apparatus may include: the system comprises an acquisition module 101, an updating module 102 and a broadcasting module 103; wherein,
an obtaining module 101, configured to obtain a key update flag of a current key; the key updating mark is a key updating mark generated by each network node device at random time;
an updating module 102, configured to obtain the local current key and the network identification code; updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm;
a broadcasting module 103, configured to broadcast the key update flag to each network node device, and configured to trigger each network node device to synchronously update the current key of each network node device according to the key update flag.
According to the key updating device, the key updating mark of the current key generated by each network node device at random time is obtained through the obtaining module 101, the local current key and the network identification code are obtained through the updating module 102, the current key is updated according to the key updating mark, the current key and the network identification code through the key updating algorithm, the key updating mark is broadcasted through the broadcasting module 103, each network node device is triggered to synchronously update the respective current key according to the key updating mark, each network node device is enabled to achieve autonomous synchronous updating of the key of itself at random time, the security and the reliability of key updating are improved, and the security and the reliability of information transmission are also improved.
In one embodiment, a portable smart device is provided that updates a key using a key update method as described in any one of the above embodiments.
The portable intelligent device includes intelligent devices such as an intelligent bracelet and an intelligent mobile phone, and the portable intelligent device may be connected to the trusted network system of ternary peer authentication shown in fig. 1, for example, join the trusted network system as a network node device in the network request device 300, and may update the current key of the portable intelligent device by using the key update method according to any one of the above embodiments when the local current key needs to be updated.
The portable intelligent device updates the key by adopting the key updating method according to any one of the embodiments, so that the portable intelligent device can independently update the key of the portable intelligent device at random time, the security and the reliability of key updating are improved, and the security and the reliability of information transmission by using the updated key in the portable intelligent device are also improved.
In one embodiment, a portable intelligent device management system is provided, and referring to fig. 5, fig. 5 is a network structure diagram of the portable intelligent device management system in one embodiment, and the portable intelligent device management system may include: the portable intelligent device 400, the network service management platform 200 and the authentication server 200 are in communication connection in sequence; the portable intelligent device 400, the network service management platform 200 and the authentication server 100 may update the key by using the key updating method according to any of the above embodiments.
In this embodiment, the portable intelligent device management system may be implemented based on a trusted network architecture of ternary peer authentication, the authentication server 100 may be configured to provide bidirectional identity authentication for the network service management platform 200 and the portable intelligent devices 400, the network service management platform 200 may manage a plurality of portable intelligent devices 400, for example, the first portable intelligent device 410 is managed by the first network service management platform 210, the second portable intelligent device 420 is managed by the second network service management platform 220, and the portable intelligent devices 400 may include wearable intelligent devices and the like.
The following describes the operation principle of updating a key in the portable intelligent device management system provided in the foregoing embodiment, with reference to fig. 6, where fig. 6 is a schematic flow chart of a key updating method in another embodiment, and the key updating method may include the following steps:
s1, each network node device initializes the parameters to obtain initialized node parameters.
The steps are mainly that each network node device in the trusted network system performs parameter initialization, for example, when the authentication server 100 is started, the system performs initialization, the initialization is performed according to the system and the set security parameter K, and the system generates a key generation parameter XA, an initial key MKeyA and a key update parameter CKeyA through a parameter initialization algorithm. The key generation parameters XA include initialization node parameters such as a plaintext space MA, a ciphertext space CA, and a random number space RA. Each time the key is generated or updated, the system randomly generates a time constant in the random number space, and the system sets the time for updating the key next time according to the time constant. In addition, the wearable intelligent device and the network service management platform are initialized when being started for the first time, and corresponding initialization node parameters are generated in the same way.
s2, the network requesting device sends a parameter query command to the network service platform.
In this step, after the wearable smart device is initially started and associated with the network service management platform, the wearable smart device may query the network service management platform for the communication public key of the authentication server. The wearable intelligent device sends a parameter inquiry command to the network service management platform, wherein the command can carry information including: the command identifier QR, the key generation parameter XR of the wearable smart device, and the network identification code IDR of the wearable smart device.
And s3, the network service platform checks the validity of the parameter inquiry command.
After receiving a parameter inquiry command of the wearable intelligent device, the network service management platform carries out legal verification on a command identifier (QR) in the command, and if the judgment result of the legal verification is illegal, the received command is discarded and the connection is disconnected; if the result of the validity check is valid, s4 can be executed.
s4, the network service management platform extracts the inquiry information from the parameter inquiry command and generates a parameter inquiry command to the authentication server.
The network service management platform identifies inquiry information of the wearable intelligent device to the authentication server from the parameter inquiry command of the wearable intelligent device, and generates a parameter inquiry command to the authentication server, wherein the parameter inquiry command can carry information including: the method comprises the steps of a command identifier QR & QN, a key generation parameter XR of the wearable intelligent device, a network identification code IDR of the wearable intelligent device, a key generation parameter PN of a network service management platform and a network identification code IDN of the network service management platform.
s5, the authentication server checks the validity of the parameter inquiry command, if the parameter inquiry command is legal, the authentication server extracts the inquiry information, and calculates the public key of the corresponding network node device according to the inquiry information.
After receiving a parameter inquiry command of a network service management platform, the authentication server carries out legal verification on a command identifier QR & QN in the command, and if the judgment result of the legal verification is illegal, the authentication server discards the received data command and disconnects the connection; if the judgment result of the legal verification is legal, the key generation parameters and the corresponding network identification codes of the wearable intelligent device and the network service management platform are respectively stored, the authentication server calculates a public key initial value through a key initialization algorithm according to the initialization node parameters of the wearable intelligent device and the network service management platform, and further generates a corresponding public key through a public key generation algorithm according to the public key initial value and the key generation parameters corresponding to the wearable intelligent device and the network service management platform.
And s6, the authentication server constructs a parameter response command and sends the parameter response command to the network service management platform.
The authentication server constructs a parameter response command, and the information that can be carried by the parameter response command includes: and the parameter response symbol YN & YR, the key generation parameter XA of the authentication server and the network identification code IDA of the authentication server are sent to the network service management platform.
And s7, the network service management platform checks the validity of the parameter response command, and if the parameter response command is legal, the network service management platform extracts the response information.
After receiving a parameter response command of the authentication server, the network service management platform carries out legal verification on parameter response characters YN & YR in the command, if the judgment result of the legal verification is illegal, the received data command is discarded, and the condition that the authentication of the network service management platform to the authentication server is unsafe is judged; if the judgment result of the legal verification is legal, the key generation parameter XA and the network identification code IDA of the authentication server are saved.
And s8, the network service management platform constructs a parameter response command and sends the parameter response command to the network request device.
The network service management platform constructs a parameter response command, and the information carried by the parameter response command may include: and the parameter response symbol YR, the key generation parameter XA of the authentication server and the network identification code IDA of the authentication server are sent to the wearable intelligent device.
s9, the network request device checks the validity of the parameter response command, if it is valid, the network request device saves the initialization node parameter of the authentication server.
After receiving an application response command of the network service management platform, the wearable intelligent device carries out legal verification on an application response symbol YR in the command, if the judgment result of the legal verification is illegal, the received data command is discarded, and the fact that the wearable intelligent device authenticates the network service management platform is unsafe is judged; if the judgment result of the legal verification is legal, the key generation parameter XA and the network identification code IDA of the authentication server are saved.
Once each network node device outputs the respective key generation parameter X and the network identification code, each network node device may perform the respective private key initialization. Taking the authentication server as an example, the initialization step of the private key is as follows:
s10, each network node device generates a seed private key.
The authentication server generates a seed private key S by a private key initialization algorithm through a private key generation parameter XA, an initial key MKeyA and a network identification code of the authentication serverA,0
s11, the respective network node device generates an assistance private key.
The authentication server generates an assistant private key AK corresponding to the current update mark by an assistant key algorithm according to a key generation parameter XA of the authentication server, a key update mark n of the current key, a key update parameter CKeyA and a network identification codeA,n
s12, each network node device generates an update private key from the seed private key and the assist private key.
Once the authentication server starts updating the private key, the authentication server may generate the key generation parameter XA of the authentication server, and the assistant private key AK corresponding to the current key update flagA,nSeed private key S before updating private keyA,n-1And a network identification code for generating a private key S corresponding to the current update mark by a private key update algorithmA,n
s13, broadcasting a key update flag.
And after the authentication server finishes updating the private key, the authentication server broadcasts the current key updating mark n to the outside. When a receiving end such as a network service management platform or wearable intelligent equipment receives the key updating mark n, data encryption is carried out through a corresponding encryption algorithm, and the system can carry out the next data communication.
The portable intelligent device, the network service management platform and the authentication server in the portable intelligent device management system all adopt the key updating method described in any embodiment to update respective keys, and also provide a key updating method of the portable intelligent device, which updates the private key of the ternary peer authentication system at random time by optimizing the key updating method, improves the safety and reliability of the portable device network, realizes that each network node device in the portable intelligent device management system automatically and synchronously updates respective keys at random time, improves the safety and reliability of the key updating of each network node device in the portable intelligent device management system, ensures the communication safety and reliability of the portable intelligent device management system, and realizes that under the condition that the user experience is not influenced, the ternary portable intelligent device system can autonomously update the system key, and greatly improves the safety and reliability of the client information.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 7. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing data required in the key updating method flow. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a key update method.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a key update method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the configurations shown in fig. 7 or fig. 8 are only block diagrams of some of the configurations relevant to the inventive arrangements, and do not constitute a limitation on the computing devices to which the inventive arrangements may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when the processor executes the computer program, the key update method according to any of the above embodiments is implemented.
According to the computer equipment, the safety and the reliability of key updating are improved and the safety and the reliability of information transmission are also improved through the computer program running on the processor.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements a key update method as described in any one of the above embodiments.
The computer readable storage medium improves the security and reliability of key updating and also improves the security and reliability of information transmission through the stored computer program.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A key update method, comprising the steps of:
acquiring a key updating mark of a current key; the key updating mark is generated by the network node equipment at random time;
acquiring the local current secret key and the network identification code; updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm;
and broadcasting the key updating mark to each network node device, so as to trigger each network node device to synchronously update the current key of each network node device according to the key updating mark.
2. The key renewal method of claim 1, wherein the step of obtaining the key renewal flag of the current key comprises:
extracting a time random number from a random number space pre-stored locally;
setting the key updating time of the current key according to the time random number;
and generating a key updating mark of the current key according to the key updating time.
3. The key renewal method of claim 1, wherein the step of obtaining a key renewal flag comprises:
and receiving the key updating marks broadcasted by each network node device.
4. The key renewal method of claim 1, wherein the step of renewing the current key according to the key renewal flag, the current key and the network identification code by the key renewal algorithm comprises:
using the current key as a seed key for updating the current key;
acquiring local key generation parameters and key updating parameters;
generating an assisting key corresponding to the key updating mark according to the key generation parameter, the key updating parameter, the network identification code and the key updating mark by using an assisting key algorithm;
and generating an updating key corresponding to the key updating mark according to the seed key, the assisting key, the key generation parameter and the network identification code by using a key updating algorithm.
5. The rekeying method of claim 4, wherein the step of obtaining a local current key comprises:
acquiring local key generation parameters and an initial key;
generating a local initial seed key according to the key generation parameter, the initial key and the network identification code;
inquiring a historical key updating mark; and acquiring the current key according to the initial seed key and a historical key updating mark.
6. The key updating method according to any one of claims 1 to 5, further comprising the steps of:
acquiring initialization node parameters of each network node device; wherein the initializing node parameters comprise: the network identification code, the key generation parameter, the initial key and the key update parameter of each network node device; the key generation parameters comprise a plaintext space, a ciphertext space and a random number space; the plaintext space and the ciphertext space are used for updating the current key through the key updating algorithm, and the random number space is used for setting the random time for generating the key updating mark;
and calculating the public key of each network node device according to the initialization node parameters.
7. The key update method according to claim 6, wherein the step of obtaining initialization node parameters of the respective network node devices comprises:
receiving a parameter inquiry command sent by the network node equipment; wherein the parameter query command carries an initialization node parameter of the network node device and a command identifier of the parameter query command; the command identifier is used for identifying the command format of the parameter inquiry command;
carrying out validity check on the command format of the parameter inquiry command according to the command identifier;
if the command format is the legal inquiry command format, extracting the initialization node parameter of the network node equipment from the parameter inquiry command and storing the initialization node parameter locally, and generating a parameter response command corresponding to the initialization node parameter by using the local initialization node parameter and feeding the parameter response command back to the network node equipment; otherwise, discarding the parameter inquiry command;
the step of calculating the public key of each network node device according to the initialization node parameters comprises:
calculating the initial value of the public key of each network node device by using a public key initialization algorithm according to the initialization node parameters of each network node device;
and generating the public key of each network node device by using a public key generation algorithm according to the public key initial value and the initialization node parameter of each network node device.
8. A key update apparatus, comprising:
the acquisition module is used for acquiring a key updating mark of a current key; the key updating mark is a key updating mark generated by each network node device at random time;
the updating module is used for acquiring the local current secret key and the local network identification code; updating the current key according to the key updating mark, the current key and the network identification code through a key updating algorithm;
a broadcasting module, configured to broadcast the key update flag to each network node device, and configured to trigger each network node device to synchronously update the current key of each network node device according to the key update flag.
9. A portable smart device, characterized in that it updates a key using the key update method according to any one of claims 1 to 7.
10. A portable intelligent device management system, comprising: the system comprises portable intelligent equipment, a network service management platform and an authentication server which are in communication connection in sequence; wherein,
the portable intelligent device, the network service management platform and the authentication server all adopt the key updating method of any one of claims 1 to 7 to update keys.
CN201810373760.5A 2018-04-24 2018-04-24 key updating method and device, portable intelligent device Pending CN108566276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810373760.5A CN108566276A (en) 2018-04-24 2018-04-24 key updating method and device, portable intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810373760.5A CN108566276A (en) 2018-04-24 2018-04-24 key updating method and device, portable intelligent device

Publications (1)

Publication Number Publication Date
CN108566276A true CN108566276A (en) 2018-09-21

Family

ID=63536670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810373760.5A Pending CN108566276A (en) 2018-04-24 2018-04-24 key updating method and device, portable intelligent device

Country Status (1)

Country Link
CN (1) CN108566276A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021007736A1 (en) * 2019-07-15 2021-01-21 小白投资有限公司 Network encryption method
CN115664661A (en) * 2022-10-31 2023-01-31 北京神经元网络技术有限公司 Key updating method, device, device and storage medium on industrial field bus
CN115941182A (en) * 2023-02-21 2023-04-07 浙江国利信安科技有限公司 Method, computing device and storage medium for network key update

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692637A (en) * 2009-09-23 2010-04-07 东南大学 Key management method for multicast
CN102547690A (en) * 2010-12-13 2012-07-04 中兴通讯股份有限公司 Wireless sensor network system, node equipment and secret key generating method thereof
CN104936175A (en) * 2014-03-21 2015-09-23 上海贝尔股份有限公司 Method for updating key in dual connection communication environment and device thereof
US20160182562A1 (en) * 2014-12-18 2016-06-23 Go Daddy Operating Company, LLC Time based authentication codes
US20180084413A1 (en) * 2016-09-16 2018-03-22 Qualcomm Incorporated On-demand network function re-authentication based on key refresh

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692637A (en) * 2009-09-23 2010-04-07 东南大学 Key management method for multicast
CN102547690A (en) * 2010-12-13 2012-07-04 中兴通讯股份有限公司 Wireless sensor network system, node equipment and secret key generating method thereof
CN104936175A (en) * 2014-03-21 2015-09-23 上海贝尔股份有限公司 Method for updating key in dual connection communication environment and device thereof
US20160182562A1 (en) * 2014-12-18 2016-06-23 Go Daddy Operating Company, LLC Time based authentication codes
US20180084413A1 (en) * 2016-09-16 2018-03-22 Qualcomm Incorporated On-demand network function re-authentication based on key refresh

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何粒波等: "《无证书并行密钥隔离加密机制》", 《计算机应用研究》 *
黄梦婕等: "《基于HMAC算法的远程电力监控通信安全策略》", 《电力系统保护与控制》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021007736A1 (en) * 2019-07-15 2021-01-21 小白投资有限公司 Network encryption method
US11968192B2 (en) 2019-07-15 2024-04-23 Siaobi Inc. Network encryption method
CN115664661A (en) * 2022-10-31 2023-01-31 北京神经元网络技术有限公司 Key updating method, device, device and storage medium on industrial field bus
CN115941182A (en) * 2023-02-21 2023-04-07 浙江国利信安科技有限公司 Method, computing device and storage medium for network key update
CN115941182B (en) * 2023-02-21 2024-01-30 浙江国利信安科技有限公司 Method, computing device, and storage medium for network key update

Similar Documents

Publication Publication Date Title
US11336641B2 (en) Security enhanced technique of authentication protocol based on trusted execution environment
CN111211908B (en) Access control method, system, computer device and storage medium
CN109361669B (en) Identity authentication method, device and equipment of communication equipment
CN106357649B (en) User identity authentication system and method
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
US12096207B2 (en) Network access authentication method and device
CN112559993B (en) Identity authentication method, device and system and electronic equipment
CN112597481A (en) Sensitive data access method and device, computer equipment and storage medium
CN111107073B (en) Application automatic login method and device, computer equipment and storage medium
CN108965416B (en) Medical data sharing method and device, computer equipment and storage medium
US11271922B2 (en) Method for authenticating a user and corresponding device, first and second servers and system
WO2020215568A1 (en) Communication number changing method, apparatus and system, computer device and storage medium
JP6967449B2 (en) Methods for security checks, devices, terminals and servers
US11968300B2 (en) Data extraction system, data extraction method, registration apparatus, and program
KR20180067183A (en) System and Method for Creating and Disposal of Identification associated with User Bio Information
CN109040060B (en) Terminal matching method and system, computer equipment
CN114143108A (en) Session encryption method, device, equipment and storage medium
CN111818196A (en) Domain name resolution method, domain name resolution device, computer equipment and storage medium
CN111259363A (en) Service access information processing method, system, device, equipment and storage medium
CN108566276A (en) key updating method and device, portable intelligent device
CN110225017B (en) Identity authentication method, equipment and storage medium based on alliance block chain
CN109286933B (en) Authentication method, device, system, computer equipment and storage medium
KR102171377B1 (en) Method of login control
CN113132982B (en) Data forwarding method and device, computer equipment and storage medium
CN113569210A (en) Distributed identity authentication method, device access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180921

RJ01 Rejection of invention patent application after publication