[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN104158816A - Authentication method and device as well as server - Google Patents

Authentication method and device as well as server Download PDF

Info

Publication number
CN104158816A
CN104158816A CN201410421329.5A CN201410421329A CN104158816A CN 104158816 A CN104158816 A CN 104158816A CN 201410421329 A CN201410421329 A CN 201410421329A CN 104158816 A CN104158816 A CN 104158816A
Authority
CN
China
Prior art keywords
message
server
digital signature
pki
successful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410421329.5A
Other languages
Chinese (zh)
Inventor
姜妮
张宇
赵志军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Institute of Acoustics CAS
Original Assignee
Institute of Acoustics CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS filed Critical Institute of Acoustics CAS
Priority to CN201410421329.5A priority Critical patent/CN104158816A/en
Publication of CN104158816A publication Critical patent/CN104158816A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to an authentication method and device as well as a server. The method comprises the following steps that: a server receives a command sent by a message releasing end, wherein the command is used for instructing the server to generate a key pair in order that the message releasing end generates a digital signature according to a private key in the key pair; the sever receives a first message sent by the message releasing end, wherein the first message comprises a public key in the key pair, the digital signature, a message and a message releasing end IP (Internet Protocol); the server matches the message releasing end IP with a preset white list according to the message releasing end IP; and after successful matching, the server verifies the message according to the public key and the digital signature, and pushes the message after successful verification.

Description

Authentication method, device and server
Technical field
The present invention relates to communication technical field, relate in particular to authentication method, device and the server of message push system.
Background technology
Along with the development of technology of Internet of things, people more urgently wish can be whenever and wherever possible from the Internet obtaining information and service.Yet increasing content is just constantly flooded with network, people have been difficult to find own interested resource by simple active searching.In order to guarantee that these information can be seen by user timely and effectively, than traditional mode that pulls, message push mode more meets the needs in practical application.For distributed message push system application, whether issue or the message of subscribing to can arrive safely timely, and communicating pair is all had to very important effect.Message push system need to guarantee integrality and the reliability of message, guarantees that message do not lose, do not repeat, do not distort in transmitting procedure.
Yet, in the design of existing message push system, due to the bootlegging of computer software, the divulging a secret of communication, data security is on the hazard, but lacks security authentication mechanism, has caused the security breaches in message push system.
Summary of the invention
The object of the invention is to guarantee the fail safe of message push system, avoid individual user's illegal connection to invade and destroy data, affect network security.
First aspect, the embodiment of the present invention provides a kind of authentication method, and described method comprises:
The instruction that server receipt message publishing side sends, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
The first message that described server receipt message publishing side sends, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Described server, according to described data publish end IP, mates described data publish end IP with local default white list;
After the match is successful, described server, according to described PKI and digital signature, is verified described message, after being proved to be successful, described message is pushed.
Preferably, described server, according to described PKI and digital signature, is verified specifically and is comprised described message:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
Preferably, described hash algorithm is specially any one in MD2, MD4, MD5 or SHA-1.
Preferably, described server is MQTT proxy server.
Second aspect, the embodiment of the present invention provides a kind of authenticate device, and described device comprises: the first receiving element, the second receiving element, the first matching unit, the second matching unit;
Described the first receiving element, the instruction sending for server receipt message publishing side, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
Described the second receiving element, the first message sending for receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Described the first matching unit, for according to described data publish end IP, mates described data publish end IP with local default white list;
Described the second matching unit, for according to described PKI and digital signature, verifies described message, after being proved to be successful, described message is pushed.
Preferably, described the second matching unit specifically for:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
Preferably, described hash algorithm is specially any one in MD2, MD4, MD5 or SHA-1.
Preferably, described server is MQTT proxy server.
The third aspect, the embodiment of the present invention provides a kind of server, and described server comprises:
Receiver, the instruction that receipt message publishing side sends, described instruction is used to indicate processor and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
The first message that described receiver also sends for, receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Processor, according to described data publish end IP, mates described data publish end IP with white list default in memory;
Described processor also for, after the match is successful, according to described PKI and digital signature, described message is verified.
Transmitter, after being proved to be successful, pushes described message.
Preferably, described processor specifically for:
Described processor adopting hash algorithm obtains the message digest of described message;
Described processor adopting PKI is decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
The authentication method, device and the server that by the application embodiment of the present invention, provide, after the match is successful, described server is according to PKI and digital signature, message is verified, after success, message is pushed to message subscribing end, guaranteed the fail safe of data publish end to the message of message subscribing end, integrality, reliability and non repudiation, avoided message in transmitting procedure, to be tampered or rogue attacks, met the demand for security of enterprise-level application, disposed simple, cost-saving, extensibility is strong, can be applied in other system equally.
Accompanying drawing explanation
Fig. 1 for the embodiment of the present invention one provide based on MQTT publish/subscribe mechanism message push system Organization Chart;
The authentication method flow chart that Fig. 2 provides for the embodiment of the present invention one;
The publish/subscribe mechanism based on theme that Fig. 3 provides for the embodiment of the present invention one;
The authenticate device schematic diagram that Fig. 4 provides for the embodiment of the present invention two;
The server schematic diagram that Fig. 5 provides for the embodiment of the present invention three.
Embodiment
For making object, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making the every other embodiment obtaining under creative work prerequisite, belong to the scope of protection of the invention.
Understanding for ease of to the embodiment of the present invention, is further explained explanation below in conjunction with accompanying drawing with specific embodiment, and embodiment does not form the restriction to the embodiment of the present invention.
The authentication method that the embodiment of the present application provides, device and server, be applicable to message push to carry out the scene of safety certification, be particularly useful for the scene to the safety certification of message queue remote measurement transmission (Message Queuing Telemetry Transport, MQTT) publish/subscribe mechanism system.
In order to guarantee the fail safe of message push system, avoid individual user's illegal connection to invade and destroy data, affect network security, the application can authenticate and data signature mechanism by IP, the safety while guaranteeing message push operation.
Fig. 1 for the embodiment of the present invention one provide based on MQTT publish/subscribe mechanism message push system Organization Chart.
Message push system mainly comprises three parts: data publish end 110, message server 120 (also can be called for short server hereinafter), message subscribing end 130.Data publish end 110 is equivalent to the producer of message, and the every production a piece of news of application program, does not directly give message recipient, but give server, by server 120, determines message is sent to which receiving terminal.Message subscribing end 130 is equivalent to the consumer of message, message subscribing end 130 is to server 120 subscribe message or the message that cancels subscriptions, message subscribing end 130 has the message sink queue of oneself, and can be as required to message unpack, decompression and decryption processing.Server 120 is soul places of whole message push system, for the message receiving, carries out relevant treatment, is pushed to corresponding message subscribing end 130.
The authentication method that the Fig. 2 of take below provides as the example detailed description embodiment of the present invention, the authentication method flow chart that Fig. 2 provides for the embodiment of the present invention one, subject of implementation is the equipment with disposal ability in embodiments of the present invention: server or device, for example: MQTT proxy server.As shown in Figure 2, this embodiment specifically comprises the following steps:
S210, the instruction that server receipt message publishing side sends, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair.
Data publish end can be, but not limited to the web page server in platform of internet of things.Server includes but not limited to MQTT proxy server.
The instruction that server receipt message publishing side sends, this instruction is for the digital signature identification module of invoking server, and server, according to described instruction, generates key pair.Wherein, digital signature identification module is the subprogram in server, can regard relatively independent module as, when message subscribing end need to carry out corresponding certain processing, call corresponding module (processing subprogram), for example need to generate key to time, call number signature verification module.In order to illustrate in greater detail implementation process of the present invention, the software module relating in embodiments of the present invention, all in server.
Key is to comprising PKI and private key, and data publish end adopts hash algorithm, and the raw message digest that generates of the message that will send, adopts private key to be encrypted message digest, and the summary after encryption is the digital signature of message.
Hash algorithm includes but not limited to Message Digest 5 (Message-Digest Algorithm2, MD2), MD4, MD5 or SHA (Secure Hash Algorithm, SHA-1).
S220, the first message that server receipt message publishing side sends, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair.
The IP address that data publish end IP is web page server.
Message is the data message that data publish end will be issued.
S230, according to data publish end IP, mates described data publish end IP with default white list.
In server, set in advance white list, white list is the data publish end IP of server authorizes.Server can call its IP authentication module, and data publish end IP is mated with white list, and wherein, IP authentication module is the same with digital signature identification module, is the processing subprogram in server.
When data publish end IP and white list are when the match is successful, description messages publishing side is legal, now enters step S240.
When data publish end IP and white list are when it fails to match, description messages publishing side is illegal, and now server returns to miscue to data publish end.
S240, after the match is successful, described server, according to described PKI and digital signature, is verified described message, after being proved to be successful, described message is pushed.
Its digital signature identification module of server calls, verifies message.
Preferably, described server, according to described PKI and digital signature, is verified specifically and is comprised described message:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.Now, server is pushed to message subscribing end by message, and returns to successfully prompting to data publish end.
When described message digest is different with described decrypted message summary, authentication failed.Now, server does not push this message to message subscribing end, and returns to miscue to data publish end.
Wherein, message subscribing end is terminal, includes but not limited to mobile phone, panel computer, notebook computer, desktop computer.
Be understandable that, the hash algorithm when hash algorithm adopting when server obtains message digest and data publish end extract message digest is same algorithm.
Further, described message comprises message theme;
After being proved to be successful, message server mates described message theme with the theme of message subscribing end, and the corresponding message of message theme is pushed to corresponding message subscribing end.
Particularly, as shown in Figure 3, the publish/subscribe mechanism based on theme that Fig. 3 provides for the embodiment of the present invention one.In Fig. 3, the legal message that server can send the data publish end that receives be arranged, example and non-limiting, server can be arranged message according to message theme, form theme queue, such as, can be by message classification for containing theme X, the message of theme Y etc.Message subscribing end is connected to server, completes registration and obtains register account number, subscribes to or cancel the theme of oneself.Message subscribing end can comprise a terminal, also can comprise a plurality of terminals, the message of described one or more terminal subscribes difference or same subject, server is pushed to corresponding terminal according to the theme of local message theme and the ordered message of message subscribing end by message, such as terminal A and terminal C have subscribed to theme X, server is pushed to the message of theme X terminal A and terminal C, and terminal B has subscribed to theme Y, and server is pushed to terminal B by the message of theme Y.
The authentication method that adopts the embodiment of the present invention to provide, server, according to data publish end IP, mates data publish end IP with default white list; After the match is successful, server, according to described PKI and digital signature, is verified message, after being proved to be successful, message is pushed to message subscribing end, guaranteed the fail safe of data publish end to the message of message subscribing end, integrality, reliability and non repudiation, avoided message in transmitting procedure, to be tampered or rogue attacks, met the demand for security of enterprise-level application, dispose simple, cost-saving, extensibility is strong, can be applied in other system equally.
Fig. 4 is the authenticate device schematic diagram that the embodiment of the present invention two provides.As shown in Figure 4, in the present embodiment, comprising: the first receiving element 410, the second receiving element 420, the first matching unit 430, the second matching units 440;
Described the first receiving element 410, the instruction sending for server receipt message publishing side, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
Described the second receiving element 420, the first message sending for receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Described the first matching unit 430, for according to described data publish end IP, mates described data publish end IP with default white list;
Described the second matching unit 440, for according to described PKI and digital signature, verifies described message, after being proved to be successful, described message is pushed.
Alternatively, described the second matching unit 440 specifically for:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
Alternatively, described hash algorithm is specially any one in MD2, MD4, MD5 or SHA-1.
Alternatively, described server is MQTT proxy server.
The authenticate device that adopts the embodiment of the present invention to provide, server, according to described data publish end IP, mates described data publish end IP with default white list; After the match is successful, described server, according to described PKI and digital signature, is verified described message, after being proved to be successful, described message is pushed to message subscribing end, guaranteed the fail safe of data publish end to the message of message subscribing end, integrality, reliability and non repudiation, avoided message in transmitting procedure, to be tampered or rogue attacks, met the demand for security of enterprise-level application, dispose simple, cost-saving, extensibility is strong, can be applied in other system equally.
The server schematic diagram that Fig. 5 provides for the embodiment of the present invention three.As shown in Figure 5, the present embodiment comprises: receiver 510, processor 520, memory 530, transmitter 540.Wherein receiver 510, processor 520, and memory 530 is connected by system bus (not shown in Fig. 5) with transmitter 540.
Receiver 510, the instruction that receipt message publishing side sends, described instruction is used to indicate described processor and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
The first message that described receiver 510 also sends for, receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Processor 520, according to described data publish end IP, mates described data publish end IP with white list default in memory 530;
Described processor 520 also for, after the match is successful, according to described PKI and digital signature, described message is verified.
Transmitter 540, after being proved to be successful, pushes described message.
Alternatively, described processor 520 specifically for:
Described processor adopting hash algorithm obtains the message digest of described message;
Described processor adopting PKI is decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
Server can adopt the method with Fig. 3, and message is pushed to message subscribing end, repeats no more herein.
Professional should further recognize, unit and the algorithm steps of each example of describing in conjunction with embodiment disclosed herein, can realize with electronic hardware, computer software or the combination of the two, for the interchangeability of hardware and software is clearly described, composition and the step of each example described according to function in the above description in general manner.These functions are carried out with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can specifically should be used for realizing described function with distinct methods to each, but this realization should not thought and exceeds scope of the present invention.
The software module that the method for describing in conjunction with embodiment disclosed herein or the step of algorithm can use hardware, processor to carry out, or the combination of the two is implemented.Software module can be placed in the storage medium of any other form known in random asccess memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field.
Above-described embodiment; object of the present invention, technical scheme and beneficial effect are further described; institute is understood that; the foregoing is only the specific embodiment of the present invention; the protection range being not intended to limit the present invention; within the spirit and principles in the present invention all, any modification of making, be equal to replacement, improvement etc., within all should being included in protection scope of the present invention.

Claims (10)

1. an authentication method, is characterized in that, described method comprises:
The instruction that server receipt message publishing side sends, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
The first message that described server receipt message publishing side sends, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Described server, according to described data publish end IP, mates described data publish end IP with local default white list;
After the match is successful, described server, according to described PKI and digital signature, is verified described message, after being proved to be successful, described message is pushed.
2. method according to claim 1, is characterized in that, described server, according to described PKI and digital signature, is verified specifically and comprised described message:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
3. method according to claim 1 and 2, is characterized in that, described hash algorithm is specially any one in Message Digest 5 MD2, MD4, MD5 and SHA SHA-1.
4. method according to claim 1, is characterized in that, described server is message queue remote measurement transmission MQTT proxy server.
5. an authenticate device, is characterized in that, described device comprises: the first receiving element, the second receiving element, the first matching unit, the second matching unit;
Described the first receiving element, the instruction sending for server receipt message publishing side, described instruction is used to indicate described server and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
Described the second receiving element, the first message sending for receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Described the first matching unit, for according to described data publish end IP, mates described data publish end IP with local default white list;
Described the second matching unit, for according to described PKI and digital signature, verifies described message, after being proved to be successful, described message is pushed.
6. device according to claim 5, is characterized in that, described the second matching unit specifically for:
Described server adopts hash algorithm to obtain the message digest of described message;
Described server adopts PKI to be decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
7. according to the device described in claim 5 or 6, it is characterized in that, described hash algorithm is specially any one in MD2, MD4, MD5 or SHA-1.
8. device according to claim 5, is characterized in that, described server is MQTT proxy server.
9. a server, is characterized in that, described server comprises:
Receiver, the instruction that receipt message publishing side sends, described instruction is used to indicate processor and generates key pair, so that described data publish end is according to the private key generating digital signature of described cipher key pair;
The first message that described receiver also sends for, receipt message publishing side, described the first message comprises PKI, digital signature, message and the data publish end IP of described cipher key pair;
Processor, according to described data publish end IP, mates described data publish end IP with white list default in memory;
Described processor also for, after the match is successful, according to described PKI and digital signature, described message is verified.
Transmitter, after being proved to be successful, pushes described message.
10. server according to claim 9, is characterized in that, described processor specifically for:
Described processor adopting hash algorithm obtains the message digest of described message;
Described processor adopting PKI is decrypted the digital signature of described message, gets decrypted message summary;
When described message digest and described decrypted message, make a summary when identical, be proved to be successful.
CN201410421329.5A 2014-08-25 2014-08-25 Authentication method and device as well as server Pending CN104158816A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410421329.5A CN104158816A (en) 2014-08-25 2014-08-25 Authentication method and device as well as server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410421329.5A CN104158816A (en) 2014-08-25 2014-08-25 Authentication method and device as well as server

Publications (1)

Publication Number Publication Date
CN104158816A true CN104158816A (en) 2014-11-19

Family

ID=51884221

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410421329.5A Pending CN104158816A (en) 2014-08-25 2014-08-25 Authentication method and device as well as server

Country Status (1)

Country Link
CN (1) CN104158816A (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105141636A (en) * 2015-09-24 2015-12-09 网宿科技股份有限公司 HTTP safety communication method and system applicable for CDN value added service platform
CN105245621A (en) * 2015-10-30 2016-01-13 大连大学 Enterprise message push system and message push method based on Message Queuing Telemetry Transport (MQTT)
CN105282143A (en) * 2015-09-09 2016-01-27 民航局空管局技术中心 Message access control method, device and system
CN106385491A (en) * 2016-09-05 2017-02-08 努比亚技术有限公司 System and method for controlling push information, mobile terminal and push server
CN106452721A (en) * 2016-10-14 2017-02-22 牛毅 Method and system for instruction identification of intelligent device based on identification public key
WO2017152767A1 (en) * 2016-03-08 2017-09-14 阿里巴巴集团控股有限公司 Published information processing method and device, and information publishing system
CN107809426A (en) * 2017-10-26 2018-03-16 珠海优特物联科技有限公司 The verification method and system of data message
CN108173860A (en) * 2017-12-29 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of MQTT connection methods, system, terminal and the server of low side constrained devices
CN108494733A (en) * 2018-02-11 2018-09-04 上海万达全程健康服务有限公司 A kind of message queue method for subscribing of health management system arranged communication
CN109002705A (en) * 2018-06-20 2018-12-14 苏州科达科技股份有限公司 process authentication method, device and server
CN109413040A (en) * 2018-09-21 2019-03-01 深圳前海微众银行股份有限公司 Message authentication method, equipment, system and computer readable storage medium
CN109474916A (en) * 2018-11-19 2019-03-15 海信集团有限公司 A kind of device authentication method, apparatus and machine readable media
CN109644185A (en) * 2016-08-18 2019-04-16 西门子移动有限公司 Method and apparatus for carrying out secure electronic data communication
WO2019127241A1 (en) * 2017-12-28 2019-07-04 Siemens Aktiengesellschaft Message queuing telemetry transport (mqtt) data transmission method, apparatus, and system
CN110383317A (en) * 2017-03-07 2019-10-25 万事达卡国际公司 For recording the method and system of point-to-point trading processing
CN111801926A (en) * 2018-01-26 2020-10-20 西门子股份公司 Method and system for disclosing at least one cryptographic key
CN112511564A (en) * 2021-01-28 2021-03-16 浙江岩华文化科技有限公司 Message pushing method, system, electronic device and storage medium
CN113098969A (en) * 2021-04-09 2021-07-09 薪得付信息技术(上海)有限公司 Data distribution method, device and system and electronic equipment
CN113285934A (en) * 2021-05-14 2021-08-20 鼎铉商用密码测评技术(深圳)有限公司 Server cipher machine client IP detection method and device based on digital signature
CN114785603A (en) * 2022-04-26 2022-07-22 英赛克科技(北京)有限公司 MQTT protocol-based security protection method, device, equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050122932A1 (en) * 2003-12-06 2005-06-09 Walter Robert C. System for interactive queuing through public communication networks
US7379921B1 (en) * 2004-11-08 2008-05-27 Pisafe, Inc. Method and apparatus for providing authentication
CN103051448A (en) * 2011-10-12 2013-04-17 中兴通讯股份有限公司 Authentication method, device and system for pairing code of business terminal attached to home gateway
CN103079176A (en) * 2012-12-31 2013-05-01 Tcl集团股份有限公司 Method and system for remotely controlling electronic equipment, mobile terminal and electronic equipment
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms
US20140040628A1 (en) * 2012-08-03 2014-02-06 Vasco Data Security, Inc. User-convenient authentication method and apparatus using a mobile authentication application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050122932A1 (en) * 2003-12-06 2005-06-09 Walter Robert C. System for interactive queuing through public communication networks
US7379921B1 (en) * 2004-11-08 2008-05-27 Pisafe, Inc. Method and apparatus for providing authentication
CN103051448A (en) * 2011-10-12 2013-04-17 中兴通讯股份有限公司 Authentication method, device and system for pairing code of business terminal attached to home gateway
US20140040628A1 (en) * 2012-08-03 2014-02-06 Vasco Data Security, Inc. User-convenient authentication method and apparatus using a mobile authentication application
CN103079176A (en) * 2012-12-31 2013-05-01 Tcl集团股份有限公司 Method and system for remotely controlling electronic equipment, mobile terminal and electronic equipment
CN103490895A (en) * 2013-09-12 2014-01-01 北京斯庄格科技有限公司 Industrial control identity authentication method and device with state cryptographic algorithms

Cited By (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282143A (en) * 2015-09-09 2016-01-27 民航局空管局技术中心 Message access control method, device and system
CN105282143B (en) * 2015-09-09 2018-06-01 北京航空航天大学 message access control method, device and system
CN105141636A (en) * 2015-09-24 2015-12-09 网宿科技股份有限公司 HTTP safety communication method and system applicable for CDN value added service platform
CN105141636B (en) * 2015-09-24 2018-04-17 网宿科技股份有限公司 Suitable for the HTTP safety communicating methods and system of CDN value-added service platforms
CN105245621A (en) * 2015-10-30 2016-01-13 大连大学 Enterprise message push system and message push method based on Message Queuing Telemetry Transport (MQTT)
CN105245621B (en) * 2015-10-30 2018-05-22 大连大学 Enterprise message supplying system and information push method based on MQTT
US10693846B2 (en) 2016-03-08 2020-06-23 Alibaba Group Holding Limited Published information processing method and device, and information publishing system
WO2017152767A1 (en) * 2016-03-08 2017-09-14 阿里巴巴集团控股有限公司 Published information processing method and device, and information publishing system
RU2723916C2 (en) * 2016-03-08 2020-06-18 Алибаба Груп Холдинг Лимитед Apparatus and method of processing published information and an information publishing system
CN109644185A (en) * 2016-08-18 2019-04-16 西门子移动有限公司 Method and apparatus for carrying out secure electronic data communication
CN106385491A (en) * 2016-09-05 2017-02-08 努比亚技术有限公司 System and method for controlling push information, mobile terminal and push server
CN106452721A (en) * 2016-10-14 2017-02-22 牛毅 Method and system for instruction identification of intelligent device based on identification public key
US11456868B2 (en) 2017-03-07 2022-09-27 Mastercard International Incorporated Method and system for recording point to point transaction processing
CN110383313B (en) * 2017-03-07 2023-08-29 万事达卡国际公司 Method and system for recording point-to-point transaction processing
CN110383313A (en) * 2017-03-07 2019-10-25 万事达卡国际公司 For recording the method and system of point-to-point trading processing
CN110383317A (en) * 2017-03-07 2019-10-25 万事达卡国际公司 For recording the method and system of point-to-point trading processing
CN107809426B (en) * 2017-10-26 2020-07-24 珠海优特智厨科技有限公司 Data information verification method and system
CN107809426A (en) * 2017-10-26 2018-03-16 珠海优特物联科技有限公司 The verification method and system of data message
WO2019127241A1 (en) * 2017-12-28 2019-07-04 Siemens Aktiengesellschaft Message queuing telemetry transport (mqtt) data transmission method, apparatus, and system
US11297107B2 (en) 2017-12-28 2022-04-05 Siemens Aktiengesellschaft Message queuing telemetry transport (MQTT) data transmission method, apparatus, and system
CN111183619A (en) * 2017-12-28 2020-05-19 西门子股份公司 Method, device and system for transmitting MQTT data through message queue telemetry transmission
CN108173860A (en) * 2017-12-29 2018-06-15 深圳市泛海三江科技发展有限公司 A kind of MQTT connection methods, system, terminal and the server of low side constrained devices
CN111801926A (en) * 2018-01-26 2020-10-20 西门子股份公司 Method and system for disclosing at least one cryptographic key
CN111801926B (en) * 2018-01-26 2023-04-28 西门子股份公司 Method and system for disclosing at least one cryptographic key
CN108494733A (en) * 2018-02-11 2018-09-04 上海万达全程健康服务有限公司 A kind of message queue method for subscribing of health management system arranged communication
CN109002705A (en) * 2018-06-20 2018-12-14 苏州科达科技股份有限公司 process authentication method, device and server
CN109413040A (en) * 2018-09-21 2019-03-01 深圳前海微众银行股份有限公司 Message authentication method, equipment, system and computer readable storage medium
CN109413040B (en) * 2018-09-21 2020-12-18 深圳前海微众银行股份有限公司 Message authentication method, device, system and computer readable storage medium
CN109474916B (en) * 2018-11-19 2020-09-18 海信集团有限公司 Equipment authentication method, device and machine readable medium
CN109474916A (en) * 2018-11-19 2019-03-15 海信集团有限公司 A kind of device authentication method, apparatus and machine readable media
CN112511564A (en) * 2021-01-28 2021-03-16 浙江岩华文化科技有限公司 Message pushing method, system, electronic device and storage medium
CN113098969A (en) * 2021-04-09 2021-07-09 薪得付信息技术(上海)有限公司 Data distribution method, device and system and electronic equipment
CN113098969B (en) * 2021-04-09 2022-12-20 薪得付信息技术(上海)有限公司 Data distribution method, device and system and electronic equipment
CN113285934A (en) * 2021-05-14 2021-08-20 鼎铉商用密码测评技术(深圳)有限公司 Server cipher machine client IP detection method and device based on digital signature
CN114785603A (en) * 2022-04-26 2022-07-22 英赛克科技(北京)有限公司 MQTT protocol-based security protection method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104158816A (en) Authentication method and device as well as server
US10447674B2 (en) Key exchange through partially trusted third party
CN106576043B (en) Virally allocatable trusted messaging
US10129254B2 (en) Automated provisioning of a network appliance
EP1819123A1 (en) Secure method of termination of service notification
CN105634737B (en) Data transmission method, terminal and system
KR102186114B1 (en) Method, system, and medium for using dynamic public key infrastructure to transmit and receive encrypted messages
US20170279602A1 (en) Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages
EP2806667A1 (en) Message filtering method and system
CN112437044B (en) Instant messaging method and device
EP2942899A1 (en) Information processing method, trust server and cloud server
CN112637230B (en) Instant messaging method and system
CN108141353B (en) Method and equipment for upgrading cryptographic algorithm
JP2009100345A (en) E-mail relay apparatus
US10742578B2 (en) Transmitter terminal, receiving apparatus, method of restricting viewing access, and computer program for viewing restriction of electronic data that has already been transmitted
CN110175471B (en) File storage method and system
WO2015074450A1 (en) Instant messaging (im) client side data transmission processprocess and apparatus
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
EP2587743A1 (en) Hypertext link verification in encrypted e-mail for mobile devices
WO2016126151A1 (en) System for establishing secure communication between multiple electronic communication devices
CN113243093A (en) System and method for message transmission and retrieval using blockchains
CA3008936C (en) Secure transmission of local private encoding data
CN103297464A (en) Program information obtaining method and device
CN114595465A (en) Data encryption processing method and device and electronic equipment
CN114765595B (en) Chat message display method, chat message sending device, electronic equipment and media

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20141119