Safety authentication method of sensor, sensor and authentication system thereof

An authentication method and sensor technology, applied in the field of electronic information, can solve problems such as hidden dangers of smart card users, and achieve the effect of avoiding hidden dangers and realizing security management.

Inactive Publication Date: 2010-07-14
卓望数码技术(深圳)有限公司
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, various illegal card readers or illegally tampered or counterfeit card readers may be il

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety authentication method of sensor, sensor and authentication system thereof
  • Safety authentication method of sensor, sensor and authentication system thereof
  • Safety authentication method of sensor, sensor and authentication system thereof

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0033] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0034] figure 1 It is a schematic diagram of the structural composition of a sensor authentication system in an embodiment of the present invention. As shown in the figure, the authentication system includes a sensor 10, an application device terminal 20, and an online device management center 30, where:

[0035] The sensor 10 is used to generate an asymmetric key pair, including a public key and a private key, safely store the private key ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a safety authentication method of a sensor, comprising the following steps: acquiring authentication information from an on-line equipment management center, wherein the authentication information comprises a timestamp and a random number; acquiring a device identification of the sensor; sending the authentication information to the sensor so as to ask fora signature; acquiring an authentication information digitally signed by the sensor; uploading an authentication request to the on-line equipment management center, wherein the authentication requestcomprises the device identification, the authentication information and the authentication information digitally signed by the sensor; and acquiring an authentication result of the on-line equipment management center. The embodiment of the invention is correspondingly provided with a sensor and an authentication system thereof. By implementing the invention, the safety management of the sensor equipment is realized and the potential safety hazard brought by utilizing illegal sensor equipment is avoided.

Description

technical field [0001] The invention relates to the technical field of electronic information, in particular to a sensor security authentication method, a sensor and an authentication system thereof. Background technique [0002] With the development of radio frequency technology and sensor technology and the promotion of products, more and more sensors have entered all walks of life, and the safety management of sensor equipment is also facing more and more challenges. Taking card readers as an example, common card readers usually only contain functional modules, without considering the issue of security management. Thereby, various illegal card readers or illegally tampered or forged card readers may be caused to illegally operate the user's smart card, which brings great security risks to the smart card user. Contents of the invention [0003] In view of this, the embodiment of the present invention obtains the authentication information signed by the sensor and sends ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04L9/30G06K7/00
Inventor 吴勇邓辉
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products