CN109359991A - Cut-in method, device and the calculating equipment of internet of things equipment - Google Patents
Cut-in method, device and the calculating equipment of internet of things equipment Download PDFInfo
- Publication number
- CN109359991A CN109359991A CN201811156795.XA CN201811156795A CN109359991A CN 109359991 A CN109359991 A CN 109359991A CN 201811156795 A CN201811156795 A CN 201811156795A CN 109359991 A CN109359991 A CN 109359991A
- Authority
- CN
- China
- Prior art keywords
- equipment
- accessed
- authenticating transactions
- transaction information
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
The invention discloses a kind of cut-in method of internet of things equipment, device and calculate equipment, comprising: when the distribution for detecting equipment to be accessed is requested, obtain the Transaction Information for the authenticating transactions that the equipment to be accessed is initiated into block chain;It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by the cloud platform of the equipment access Internet of Things to be accessed.The present invention program, the Transaction Information for the authenticating transactions initiated by equipment to be accessed into block chain identifies whether equipment to be accessed is legitimate device, known otherwise in compared to the prior art by the authentication information of equipment to be accessed, this identification method of the application can prevent the generation because the case where the illegality equipment cannot be accurately identified out caused by authentication information is burned onto illegality equipment, further ensure that the legitimacy of the internet of things equipment of access cloud platform.
Description
Technical field
The present invention relates to internet of things field, and in particular to a kind of cut-in method of internet of things equipment, device and calculating
Equipment.
Background technique
The continuous development of technology of Internet of things, a large amount of internet of things equipment are also given birth to therewith runing, in order to make internet of things equipment
What be can be convenient is communicated with cloud platform, it is necessary to be linked into internet of things equipment very easily in cloud platform.It is same with this
When, in order to ensure the legitimacy of the equipment of access cloud platform, the legitimacy of equipment need to be identified before access.Existing skill
In art, the legitimacy of equipment is usually identified by the authentication information of equipment, which includes device keys, equipment identification
The information such as code, specifically: in equipment factory, the authentication information of equipment being burned onto device chip, and is connect in device request
During entering cloud platform, verify whether the equipment is legal by the validity of the authentication information in detection device chip
Internet of things equipment;If authentication information is effective, which is accessed into cloud platform, with the communication between realization and cloud platform.
However, this verification mode in the prior art be only merely authentication information itself is verified, and due to
Authentication information itself is reproducible, if also burning has effective authentication information in the chip of illegality equipment, will lead to identification
As a result mistake, and then access to illegality equipment in cloud platform.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind
State the cut-in method, device and calculating equipment of the internet of things equipment of problem.
According to an aspect of the invention, there is provided a kind of cut-in method of internet of things equipment, comprising:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained
The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed
The cloud platform of equipment access Internet of Things.
According to another aspect of the present invention, a kind of access device of internet of things equipment is provided, comprising:
Module is obtained, suitable for obtaining the equipment to be accessed to block when the distribution for detecting equipment to be accessed is requested
The Transaction Information for the authenticating transactions initiated in chain;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed Internet of Things
The cloud platform of net.
According to another aspect of the invention, provide a kind of calculating equipment, comprising: processor, memory, communication interface and
Communication bus, the processor, the memory and the communication interface complete mutual communication by the communication bus;
For the memory for storing an at least executable instruction, it is above-mentioned that the executable instruction executes the processor
The corresponding operation of the cut-in method of internet of things equipment.
In accordance with a further aspect of the present invention, provide a kind of computer storage medium, be stored in the storage medium to
A few executable instruction, the executable instruction make processor execute the corresponding behaviour of cut-in method such as above-mentioned internet of things equipment
Make.
The cut-in method of internet of things equipment according to the present invention, device and equipment is calculated, when detecting equipment to be accessed
When distribution is requested, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by believing the transaction
The authentication result of the validity of breath identifies whether equipment to be accessed is legitimate device.In the present invention, believe compared to authentication
Breath, which is corresponding with the authenticating transactions currently initiated, and is not to pre-set, therefore not transreplication,
The identification that the legitimacy of equipment is carried out using the Transaction Information, can prevent caused by replicating because of information that illegality equipment cannot be by
The case where being recognized accurately, and the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, know
Not Chu legitimate device, with ensure access cloud platform equipment legitimacy, avoid the invasion of illegality equipment.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention,
And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can
It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field
Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention
Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the cut-in method of internet of things equipment according to an embodiment of the invention;
Fig. 2 shows the flow charts of the cut-in method of internet of things equipment in accordance with another embodiment of the present invention;
Fig. 3 shows the functional block diagram of the access device of internet of things equipment according to an embodiment of the invention;
Fig. 4 shows a kind of structural schematic diagram for calculating equipment according to an embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Fig. 1 shows the flow chart of the cut-in method of internet of things equipment according to an embodiment of the invention.Such as Fig. 1 institute
Show, this method comprises:
Step S101: it when the distribution for detecting equipment to be accessed is requested, obtains equipment to be accessed and is initiated into block chain
Authenticating transactions Transaction Information.
In the present invention, the Transaction Information for the authenticating transactions initiated by equipment to be accessed identifies the conjunction of equipment to be accessed
Method.Before executing the present invention program, the block chain that can be used for carrying out authenticating transactions need to be established, including correspondence in the block chain can
For the node of the receiving device as authenticating transactions, optionally, which is used as the receiving device of authenticating transactions
Node is the corresponding node for executing the server or authentication platform of the present invention program.
Wherein, the Transaction Information of authenticating transactions refers to the information of the Transaction Details of reflection authenticating transactions, the authenticating transactions
Transaction Information may include the characteristic attribute of the characteristic information of equipment to be accessed for initiating authenticating transactions, the receiving device of authenticating transactions
Information, and/or the information, such as transaction, number of deals of transaction content of authenticating transactions etc..
Specifically, when the distribution for detecting equipment to be accessed is requested, i.e. the request of the cloud platform of access Internet of Things obtains
The Transaction Information for the authenticating transactions that equipment to be accessed is initiated, to carry out the identification of the legitimacy of the equipment to be accessed.In the present invention,
The concrete mode for initiating authenticating transactions is not limited, optionally, authenticating transactions can actively be initiated by equipment to be accessed, or by executing
The server or authentication platform of the present invention program controls equipment to be accessed and initiates.
Step S102: it is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result.
Specifically, authenticating to the validity of authenticating transactions can be by one or more information in Transaction Information
Validity is authenticated to realize, after the validity to one or more information in Transaction Information authenticates, be passed through
Preset rules obtain the authentication result of authenticating transactions.Wherein, preset rules is can determine that equipment to be accessed has in area
The rule of trading privilege in block chain, optionally, preset rules are the item number for the Transaction Information that limitation meets effectiveness condition
Rule, or to limit the rule of the item of information for the Transaction Information for meeting effectiveness condition, the present invention is not especially limited this.
For example, preset rules are that initiate the corresponding address of equipment to be accessed of authenticating transactions be effective address, it is determined that authenticating transactions are
Effectively transaction.
Step S103: judge whether equipment to be accessed is legitimate device according to authentication result;If so, thening follow the steps
S104;If it is not, thening follow the steps S105.
Specifically, if authentication result shows that authenticating transactions are effectively transaction, it is determined that equipment to be accessed has in block chain
The middle permission for initiating effectively to trade determines equipment to be accessed then for legitimate device, then executes step S104, waiting to access this
Enter equipment;If authentication result shows that authenticating transactions are invalid transaction, it is determined that equipment to be accessed does not have to be initiated in block chain
The permission effectively traded then determines that equipment to be accessed for illegality equipment, executes step S105, then to prevent the equipment to be accessed
Access.
Step S104: by the cloud platform of equipment to be accessed access Internet of Things.
Step S105: the cloud platform of equipment access Internet of Things to be accessed is prevented.
By step S104 and step S105, can there will be the trading right for initiating effective authenticating transactions in block chain
The equipment to be accessed of limit accesses the cloud platform of Internet of Things to realize the communication of the equipment and cloud platform to be accessed;And it prevents
The equipment to be accessed for not having the trading privilege for initiating effective authenticating transactions in block chain accesses cloud platform, and then may insure
The legitimacy for accessing the equipment of cloud platform, avoids the invasion of illegality equipment.
According to the cut-in method of internet of things equipment provided in this embodiment, when the distribution for detecting equipment to be accessed is requested
When, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by the effective of the Transaction Information
The authentication result of property identifies whether equipment to be accessed is legitimate device.In the present embodiment, compared to authentication information, the friendship
Easy information is corresponding with the authenticating transactions currently initiated, and is not to pre-set, therefore not transreplication utilizes the friendship
Easy information carries out the identification of the legitimacy of equipment, can prevent illegality equipment caused by replicating because of information that cannot be accurately identified
Out the case where, occurs, and the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, it is legal to identify
Equipment avoids the invasion of illegality equipment to ensure to access the legitimacy of the equipment of cloud platform.
Fig. 2 shows the flow charts of the cut-in method of internet of things equipment in accordance with another embodiment of the present invention.Such as Fig. 2 institute
Show, this method comprises:
Step S201: being that legitimate device is transferred to for authenticating friendship according to wallet address for the preset wallet address of legitimate device
The logical card of easy block chain.
In the present embodiment, the trading privilege for the ease of determination equipment to be accessed in block chain, simultaneously, it is contemplated that private
The participation node of chain with write-in permission be it is restricted, establish privately owned chain be used as authenticating transactions block chain.Also,
In the present embodiment, only legitimate device just has the permission for initiating effective authenticating transactions.
Specifically, exist legitimate device as the form of block chain wallet, and for the preset wallet of each legitimate device
Location, the preset wallet address are uniquely corresponding with legitimate device;The preset wallet address can be randomly provided, can also be according to conjunction
The device parameter of method equipment is correspondingly arranged, and is the preset wallet address of legitimate device according to the authentication parameter of legitimate device optionally,
The authentication parameter can be the authentication informations such as device keys, device identification;Then, block chain is transferred into preset wallet address
Logical card, be used for authenticating transactions.Since private chain is not external, if not being transferred to logical card to wallet address in advance, can not send out
It rises and trades, in the present embodiment, then by being transferred to logical card in the wallet address to legitimate device, so that legitimate device is specifically initiated to hand over
Easy permission.
Step S202: it when the distribution for detecting equipment to be accessed is requested, obtains equipment to be accessed and is initiated into block chain
Authenticating transactions Transaction Information.
Wherein, Transaction Information includes the information of the Transaction Details of any reflection authenticating transactions.In an optional embodiment
In, the Transaction Information of authenticating transactions includes that the initiation addresses of authenticating transactions, authenticating transactions are transferred to address, and/or authenticating transactions
Number of deals.But the present invention is not limited thereto, when it is implemented, those skilled in the art can also flexible choice it is other
Reflect the information of Transaction Details as Transaction Information, to carry out the validity certification of authenticating transactions.
Specifically, when sending distribution to the cloud platform of Internet of Things by equipment to be accessed and requesting, when detecting that the distribution asks
It when asking, first prevents to continue distribution, but obtains the Transaction Information for the authenticating transactions that equipment to be accessed is initiated, to carry out the conjunction of equipment
The certification of method.Wherein, it (is then preset money if legitimate device that authenticating transactions, which are the corresponding wallet address of equipment to be accessed,
Packet address) to arbitrary address initiate payment transaction.Further, if equipment to be accessed be legitimate device, authenticating transactions be to
According to preset wallet address and logical card, any node into block chain (can execute this embodiment scheme to be corresponding to access device
Server or authentication platform node) payment transaction initiated of corresponding address, it may be assumed that from preset wallet address to block chain
In the transaction for producing logical card initiated of the corresponding address of any node, correspondingly, then obtaining the Transaction Information of authenticating transactions are as follows:
Obtain the Transaction Information for the authenticating transactions that equipment to be accessed is initiated according to preset wallet address and logical card into block chain.It is optional
, the default number of logical card is produced in the settable authenticating transactions of server, then obtains the Transaction Information of authenticating transactions are as follows: obtain to
The Transaction Information of the authenticating transactions for the default number that access device is initiated according to preset wallet address and logical card into block chain.
For example, authenticating transactions are that a certain node 2 of the corresponding wallet address a1 of equipment 1 to be accessed into privately owned chain is right
The wallet address a2 answered produces the payment transaction of 1 virtual coin, then the Transaction Information of the authenticating transactions obtained includes wallet address a1,
Wallet address a2 and number of deals (1 virtual coin).
Further, the mode for initiating authenticating transactions, which has, actively initiates and passively initiate two kinds: mode one is actively initiated.
While initiating distribution request to the cloud platform of Internet of Things by equipment to be accessed, an authenticating transactions have also actively been initiated,
The mode actively initiated, so that the available Transaction Information to authenticating transactions saves while detecting distribution request
The multiple interaction between the server and equipment to be accessed of this programme is executed, the effect for the legitimacy identification for improving equipment is conducive to
Rate.Mode two, it is passive to initiate.After the distribution for detecting equipment to be accessed is requested, sent out according to identification demand to equipment to be accessed
The acquisition request of the Transaction Information of authenticating transactions is sent, equipment to be accessed just passively initiates one after receiving the acquisition request
Authenticating transactions, the mode passively initiated, the server by executing this programme are determined the need for according to identification demand by obtaining
Transaction Information is taken to carry out the judgement of the legitimacy of equipment, for example, for some equipment in white list, then without knowing again
Not, it can be determined directly as legitimate device, and then authenticating transactions can be initiated for identification demand, avoid passing through to be accessed set
The authenticating transactions of initiating of standby blindness carry out the wasting of resources caused by the identification of equipment validity.
Step S203: it is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result.
Specifically, the validity of one or more information in Transaction Information is authenticated, and according to this or more
The validity authentication result of information obtains the authentication result of authenticating transactions.It is handed over separately below with the certification that Transaction Information includes
The be transferred to address and the number of deals of authenticating transactions of easy initiation address, authenticating transactions are example, to illustrate to authenticating transactions
Carry out the process of validity certification:
First, authenticating to the validity of the initiation address of authenticating transactions, the corresponding authentication result for initiating address is obtained.
In the present embodiment, only legitimate device could access the cloud platform of Internet of Things, and legitimate device is with preset wallet address
It is unique corresponding, then the initiation address of authenticating transactions is matched with the wallet address of corresponding legitimate device, if correspondence is legal
It include the initiation address of authenticating transactions in the wallet address of equipment, it is determined that the initiation address of authenticating transactions is effective address;And
If not including the initiation address of authenticating transactions in the wallet address of corresponding legitimate device, it is determined that the initiation address of authenticating transactions is
Invalid address, the corresponding equipment to be accessed in the address is not then legitimate device.
Second, the validity for being transferred to address to authenticating transactions authenticates, the corresponding authentication result for being transferred to address is obtained.
Before the scheme for executing the present embodiment, it can predefine and be used as in the corresponding wallet address of multiple nodes of private chain
The wallet address for being transferred to wallet of authenticating transactions, and these are used to carry out as the wallet address for being transferred to wallet of authenticating transactions
Storage;It optionally, is the server pair for executing this embodiment scheme for the wallet address for being transferred to wallet as authenticating transactions
The wallet address for the node answered.Then, the address that is transferred to of authenticating transactions is used to be transferred to money as authenticating transactions with what is stored
The wallet address of packet is matched, if storage is used to hand over as in the wallet address for being transferred to wallet of authenticating transactions comprising certification
Easy is transferred to address, it is determined that the address that is transferred to of authenticating transactions is effective address;And if what is stored is used for as authenticating transactions
It is transferred in the wallet address of wallet and is transferred to address not comprising authenticating transactions, it is determined that the address that is transferred to of authenticating transactions is ineffectually
Location.
Third, authenticating to the validity of the number of deals of authenticating transactions, the authentication result of corresponding number of deals is obtained.
In the present embodiment, the logical card of block chain has only been transferred into the wallet address of legitimate device, simultaneously because being used for the conjunction of equipment
The block chain of method identification is privately owned chain, and the corresponding wallet address of illegality equipment can not obtain the logical card for authenticating transactions, then
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining that the number of deals of authenticating transactions is effective
Number.Wherein, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
After obtaining corresponding to the authentication result of validity of above-mentioned one or more information, authenticated according to preset rules
The authentication result of transaction.Wherein, preset rules is can determine the trading privilege in block chain that equipment to be accessed has
Rule.Further, which can be effective result for the authentication result of the information more than default item number, it is determined that
Authenticating transactions are effectively transaction, alternatively, the authentication result that preset rules are presupposed information item is effective result, it is determined that certification is handed over
It is easily effectively transaction.Optionally, it is contemplated that the private property of privately owned chain, the corresponding wallet address of illegal equipment are not present
And logical card for authenticating transactions can not be obtained, then it can be simply considered that, which can not send out in privately owned chain at all
Authenticating transactions are played, then the authenticating transactions that can be initiated the illegality equipment are determined as a mock trading, and do not generate substantive
Transaction content (no deal number), correspondingly, preset rules are determined are as follows: if the number of deals of authenticating transactions is effective number,
Then determine that authenticating transactions are effectively transaction.For example, presetting number is 1 virtual coin, and due to the corresponding wallet of illegality equipment
There is no the logical cards for authenticating transactions in address (the wallet address is not preset), then number of deals is 0, not equal to default
Number determines that the number of deals is invalid number.
Need it is described herein be, although it is above-mentioned only using initiate address, be transferred to address and number of deals as example carry out
Explanation, but the present invention is not limited thereto, when it is implemented, those skilled in the art can also choose other items of information into
The certification of row validity, to further determine that the validity of authenticating transactions.
In addition, in an optional embodiment of the present invention, in the wallet address in order to make corresponding legitimate device always
There are enough logical cards to be used to initiate authenticating transactions, after obtaining the authentication result of authenticating transactions, by the logical of default number
Card is retracted into the preset wallet address of corresponding equipment to be accessed.
Step S204: judge whether equipment to be accessed is legitimate device according to authentication result;If so, thening follow the steps
S205;If it is not, thening follow the steps S206.
Specifically, if authentication result shows that authenticating transactions are effectively transaction, it is determined that initiate the to be accessed of authenticating transactions and set
Standby is legitimate device, thens follow the steps S205;If authentication result shows that authenticating transactions are invalid transaction, it is determined that initiate certification and hand over
Easy equipment to be accessed is illegality equipment, thens follow the steps S206.
Step S205: by the cloud platform of equipment to be accessed access Internet of Things.
Step S206: the cloud platform of equipment access Internet of Things to be accessed is prevented, and equipment to be accessed is added to and is illegally set
In standby blacklist.
It is the preset wallet address of legitimate device, Yi Jixiang according to the cut-in method of internet of things equipment provided in this embodiment
The logical card of the block chain for authenticating transactions is transferred in preset wallet address;When the distribution for detecting equipment to be accessed is requested
When, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by one in the Transaction Information
The validity of item or multinomial information is authenticated to obtain the authentication result of authenticating transactions;Then according to the certification knot of authenticating transactions
Fruit identifies whether equipment to be accessed is legitimate device.In the present embodiment, compared to authentication information, which is and works as
The authenticating transactions of preceding initiation are corresponding, and are not to pre-set, therefore not transreplication is set using the Transaction Information
The identification of standby legitimacy can prevent the case where illegality equipment cannot be accurately identified out caused by replicating because of information hair
It is raw;Also, the preset rules for passing through the trading privilege in block chain that can determine that equipment to be accessed has, recognize to determine
The transaction results of transaction are demonstrate,proved, the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, are identified
Legitimate device avoids the invasion of illegality equipment to ensure to access the legitimacy of the equipment of cloud platform.
Fig. 3 shows the functional block diagram of the access device of internet of things equipment according to an embodiment of the invention.Such as Fig. 3 institute
Show, which includes: to obtain module 301, authentication module 302, judgment module 303, AM access module 304;Optionally, the device is also
It include: to be transferred to module 305, retract module 306.
Module 301 is obtained, suitable for obtaining the equipment to be accessed to area when the distribution for detecting equipment to be accessed is requested
The Transaction Information for the authenticating transactions initiated in block chain;
Authentication module 302 obtains certification knot suitable for authenticating according to validity of the Transaction Information to authenticating transactions
Fruit;
Judgment module 303, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module 304 is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed object
The cloud platform of networking.
In a kind of optional embodiment, described device further include:
It is transferred to module 305, is the preset wallet address of legitimate device, is that the legitimate device is transferred to according to the wallet address
The logical card of block chain for authenticating transactions;
If the equipment to be accessed is legitimate device, obtains module 301 and is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over
Easy Transaction Information.
It in a kind of optional embodiment, is transferred to module 305 and is further adapted for: being according to the authentication parameter of legitimate device
The preset wallet address of legitimate device.
In a kind of optional embodiment, if the equipment to be accessed is legitimate device, it is further to obtain module 301
It is suitable for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain
The Transaction Information of the authenticating transactions of volume.
In a kind of optional embodiment, described device further include: retract module 306, be suitable for the default number
Logical card be retracted into the preset wallet address of the corresponding equipment to be accessed.
In a kind of optional embodiment, the Transaction Information of the authenticating transactions include authenticating transactions initiation address,
The number of deals for being transferred to address, and/or authenticating transactions of authenticating transactions;
Then the authentication module 302 is further adapted for:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/
Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/
Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
In a kind of optional embodiment, the authentication module 302 is further adapted for:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions
Easy number is effective number.
In a kind of optional embodiment, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
It can refer to the description of corresponding steps in embodiment of the method about the specific structure and working principle of above-mentioned modules,
Details are not described herein again.
The embodiment of the present application provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with
Connecing for the internet of things equipment in above-mentioned any means embodiment can be performed in an at least executable instruction, the computer executable instructions
Enter method.
Fig. 4 shows a kind of structural schematic diagram for calculating equipment according to an embodiment of the present invention, the specific embodiment of the invention
The specific implementation for calculating equipment is not limited.
As shown in figure 4, the calculating equipment may include: processor (processor) 402, communication interface
(Communications Interface) 404, memory (memory) 406 and communication bus 408.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for being communicated with the network element of other equipment such as client or other servers etc..
Processor 402 can specifically execute the cut-in method embodiment of above-mentioned internet of things equipment for executing program 410
In correlation step.
Specifically, program 410 may include program code, which includes computer operation instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application
Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention
Road.The one or more processors that equipment includes are calculated, can be same type of processor, such as one or more CPU;It can also
To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high speed RAM memory, it is also possible to further include
Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 executes following operation:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained
The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed
The cloud platform of equipment access Internet of Things.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following
Operation: being that the legitimate device is transferred to for authenticating transactions according to the wallet address for the preset wallet address of legitimate device
The logical card of block chain;
If the equipment to be accessed is legitimate device, the equipment to be accessed is obtained according to preset wallet address and described
The Transaction Information for the authenticating transactions that logical card is initiated into block chain.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following
Operation: being the preset wallet address of legitimate device according to the authentication parameter of legitimate device.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following
Operation: if the equipment to be accessed is legitimate device, the equipment to be accessed is obtained according to preset wallet address and described logical
Demonstrate,prove the Transaction Information of the authenticating transactions for the default number initiated into block chain.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following
Operation:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
In a kind of optional embodiment, the Transaction Information of the authenticating transactions include authenticating transactions initiation address,
The number of deals for being transferred to address, and/or authenticating transactions of authenticating transactions;
Program 410 can specifically be further used for so that processor 402 executes following operation: to the initiations of authenticating transactions
The validity of location is authenticated, and the corresponding authentication result for initiating address is obtained;And/or
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/
Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following
Operation:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions
Easy number is effective number.
In a kind of optional embodiment, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein.
Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system
Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various
Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair
Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention
Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail
And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects,
Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes
In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect
Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following
Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself
All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment
Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment
Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or
Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any
Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed
All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power
Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose
It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments
In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention
Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed
Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors
Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice
In the access device of microprocessor or digital signal processor (DSP) to realize internet of things equipment according to an embodiment of the present invention
Some or all components some or all functions.The present invention is also implemented as executing side as described herein
Some or all device or device programs (for example, computer program and computer program product) of method.It is such
It realizes that program of the invention can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape
Formula provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability
Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such
Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real
It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch
To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame
Claim.
The invention discloses: a kind of cut-in method of internet of things equipment of A1., comprising:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained
The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed
The cloud platform of equipment access Internet of Things.
A2. method according to a1, wherein in the certification for obtaining the equipment to be accessed and being initiated into block chain
Before the Transaction Information of transaction, the method also includes: it is institute according to the wallet address for the preset wallet address of legitimate device
State the logical card for the block chain that legitimate device is transferred to for authenticating transactions;
If the equipment to be accessed is legitimate device, obtains the certification that the equipment to be accessed is initiated into block chain and hand over
Easy Transaction Information further comprises:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over
Easy Transaction Information.
A3. the method according to A2, wherein for the preset wallet of legitimate device according to the authentication parameter of legitimate device
Location.
A4. the method according to A2 or A3, wherein if the equipment to be accessed is legitimate device, the acquisition institute
The Transaction Information for stating the authenticating transactions that equipment to be accessed is initiated into block chain further comprises:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain
The Transaction Information of the authenticating transactions of volume.
A5. method according to a4, wherein carried out described according to validity of the Transaction Information to authenticating transactions
Certification, after obtaining authentication result, the method also includes:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
A6. method according to a5, wherein the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions
Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
It is then described to be authenticated according to validity of the Transaction Information to authenticating transactions, it obtains authentication result and further wraps
It includes:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/
Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/
Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
A7. the method according to A6, wherein the validity of the number of deals to authenticating transactions authenticates, and obtains
Authentication result to corresponding number of deals further comprises:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions
Easy number is effective number.
A8. the method according to A7, wherein effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
The invention also discloses: a kind of access device of internet of things equipment of B9., comprising:
Module is obtained, suitable for obtaining the equipment to be accessed to block when the distribution for detecting equipment to be accessed is requested
The Transaction Information for the authenticating transactions initiated in chain;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed Internet of Things
The cloud platform of net.
B10. the device according to B9, wherein described device further include:
It is transferred to module, is the preset wallet address of legitimate device, is that the legitimate device is transferred to use according to the wallet address
In the logical card of the block chain of authenticating transactions;
If the equipment to be accessed is legitimate device, obtains module and is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over
Easy Transaction Information.
B11. device according to b10, wherein be transferred to module and be further adapted for: according to the authentication parameter of legitimate device
For the preset wallet address of legitimate device.
B12. device according to b10 or b11, wherein if the equipment to be accessed is legitimate device, obtain module
It is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain
The Transaction Information of the authenticating transactions of volume.
B13. device according to b12, wherein described device further include: retract module, be suitable for the default number
Logical card be retracted into the preset wallet address of the corresponding equipment to be accessed.
B14. device according to b13, wherein the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions
Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
Then the authentication module is further adapted for:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/
Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/
Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
B15. device according to b14, wherein the authentication module is further adapted for:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions
Easy number is effective number.
B16. the device according to B15, wherein effectiveness condition is that the number of deals of authenticating transactions is equal to present count
Volume.
The invention also discloses: a kind of calculating equipment of C17., comprising: processor, memory, communication interface and communication are total
Line, the processor, the memory and the communication interface complete mutual communication by the communication bus;
The memory executes the processor such as storing an at least executable instruction, the executable instruction
The corresponding operation of the cut-in method of internet of things equipment described in any one of A1-A8.
The invention also discloses a kind of computer storage medium of D18., being stored at least one in the storage medium can be held
Row instruction, the cut-in method pair for the internet of things equipment that the executable instruction executes processor as described in any one of A1-A8
The operation answered.
Claims (10)
1. a kind of cut-in method of internet of things equipment, comprising:
When the distribution for detecting equipment to be accessed is requested, the authenticating transactions that the equipment to be accessed is initiated into block chain are obtained
Transaction Information;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by the equipment to be accessed
Access the cloud platform of Internet of Things.
2. according to the method described in claim 1, wherein, recognizing what the acquisition equipment to be accessed was initiated into block chain
Before the Transaction Information for demonstrate,proving transaction, the method also includes: for the preset wallet address of legitimate device, it is according to the wallet address
The legitimate device is transferred to the logical card of the block chain for authenticating transactions;
If the equipment to be accessed is legitimate device, the authenticating transactions that the equipment to be accessed is initiated into block chain are obtained
Transaction Information further comprises:
The equipment to be accessed is obtained according to preset wallet address and the logical authenticating transactions initiated into block chain of demonstrate,proving
Transaction Information.
3. according to the method described in claim 2, wherein, for the preset wallet of legitimate device according to the authentication parameter of legitimate device
Location.
4. according to the method in claim 2 or 3, wherein if the equipment to be accessed is legitimate device, the acquisition institute
The Transaction Information for stating the authenticating transactions that equipment to be accessed is initiated into block chain further comprises:
The equipment to be accessed is obtained according to preset wallet address and the logical default number initiated into block chain of demonstrate,proving
The Transaction Information of authenticating transactions.
5. according to the method described in claim 4, wherein, it is described according to the Transaction Information to the validity of authenticating transactions into
Row certification, after obtaining authentication result, the method also includes:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
6. according to the method described in claim 5, wherein, the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions
Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
Then described to be authenticated according to validity of the Transaction Information to authenticating transactions, obtaining authentication result further comprises:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;And/or
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;And/or
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
7. according to the method described in claim 6, wherein, the validity of the number of deals to authenticating transactions authenticates,
The authentication result for obtaining corresponding number of deals further comprises:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the number of deals of the authenticating transactions
Volume is effective number.
8. a kind of access device of internet of things equipment, comprising:
Module is obtained, suitable for obtaining the equipment to be accessed into block chain when the distribution for detecting equipment to be accessed is requested
The Transaction Information of the authenticating transactions of initiation;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then by the equipment access Internet of Things to be accessed
Cloud platform.
9. a kind of calculating equipment, comprising: processor, memory, communication interface and communication bus, the processor, the storage
Device and the communication interface complete mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction
Ask the corresponding operation of the cut-in method of internet of things equipment described in any one of 1-7.
10. a kind of computer storage medium, an at least executable instruction, the executable instruction are stored in the storage medium
Processor is set to execute the corresponding operation of cut-in method such as internet of things equipment of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811156795.XA CN109359991A (en) | 2018-09-30 | 2018-09-30 | Cut-in method, device and the calculating equipment of internet of things equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811156795.XA CN109359991A (en) | 2018-09-30 | 2018-09-30 | Cut-in method, device and the calculating equipment of internet of things equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109359991A true CN109359991A (en) | 2019-02-19 |
Family
ID=65348519
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811156795.XA Pending CN109359991A (en) | 2018-09-30 | 2018-09-30 | Cut-in method, device and the calculating equipment of internet of things equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109359991A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113355A (en) * | 2019-05-22 | 2019-08-09 | 北京安护环宇科技有限公司 | The cut-in method and device in Internet of Things cloud |
CN111131286A (en) * | 2019-12-30 | 2020-05-08 | 百度在线网络技术(北京)有限公司 | Access control method, device, equipment and medium for block link points |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102065430A (en) * | 2010-12-28 | 2011-05-18 | 上海华御信息技术有限公司 | Method for realizing safe access of terminal of internet of thing |
CN106357644A (en) * | 2016-09-21 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
CN108306887A (en) * | 2018-02-05 | 2018-07-20 | 徐正伟 | Internet of Things safety based on block chain protects system with data-privacy |
US20180270608A1 (en) * | 2017-03-17 | 2018-09-20 | SCRRD, Inc. | Wireless Device Detection, Tracking, and Authentication Platform and Techniques |
-
2018
- 2018-09-30 CN CN201811156795.XA patent/CN109359991A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102065430A (en) * | 2010-12-28 | 2011-05-18 | 上海华御信息技术有限公司 | Method for realizing safe access of terminal of internet of thing |
CN106357644A (en) * | 2016-09-21 | 2017-01-25 | 江苏通付盾科技有限公司 | Method, system and server for authenticating identities on basis of block chain networks |
US20180270608A1 (en) * | 2017-03-17 | 2018-09-20 | SCRRD, Inc. | Wireless Device Detection, Tracking, and Authentication Platform and Techniques |
CN108306887A (en) * | 2018-02-05 | 2018-07-20 | 徐正伟 | Internet of Things safety based on block chain protects system with data-privacy |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110113355A (en) * | 2019-05-22 | 2019-08-09 | 北京安护环宇科技有限公司 | The cut-in method and device in Internet of Things cloud |
CN111131286A (en) * | 2019-12-30 | 2020-05-08 | 百度在线网络技术(北京)有限公司 | Access control method, device, equipment and medium for block link points |
CN111131286B (en) * | 2019-12-30 | 2022-06-17 | 百度在线网络技术(北京)有限公司 | Access control method, device, equipment and medium for block link points |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106339875B (en) | Operation note checking method and device based on publicly-owned block chain | |
CN109815657B (en) | Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment | |
CN110428257B (en) | Password cracking task processing method, equipment and storage medium | |
CN109981679B (en) | Method and apparatus for performing transactions in a blockchain network | |
CN108492180B (en) | Asset management method and device and electronic equipment | |
CN110096857B (en) | Authority management method, device, equipment and medium for block chain system | |
CN108898389A (en) | Based on the content verification method and device of block chain, electronic equipment | |
AU2019295815A1 (en) | Blockchain-based data verification method and apparatus, and electronic device | |
JP6574168B2 (en) | Terminal identification method, and method, system, and apparatus for registering machine identification code | |
CN106357612A (en) | Method and device for review of authentication records based on public block chains | |
CN108960825A (en) | Electric endorsement method and device, electronic equipment based on block chain | |
CN109409885A (en) | Across chain method of commerce, device and storage medium on block chain | |
CN108898021B (en) | Threat information processing method, system and computing device based on block chain | |
US20210049715A1 (en) | Blockchain-based data procesing method, apparatus, and electronic device | |
WO2015116998A2 (en) | Electronic transfer and obligation enforcement system | |
CN109600366A (en) | The method and device of protection user data privacy based on block chain | |
CN110210207A (en) | Authorization method and equipment | |
Liu et al. | Smacs: smart contract access control service | |
CN110247857A (en) | Current-limiting method and device | |
CN108769057A (en) | Personal identification method based on block chain and device | |
CN109359991A (en) | Cut-in method, device and the calculating equipment of internet of things equipment | |
CN111738724A (en) | Cross-border resource transfer authenticity auditing method and device, and electronic equipment | |
CN104375935B (en) | The test method and device of SQL injection attack | |
CN112181599B (en) | Model training method, device and storage medium | |
CN108881132A (en) | Using authorization method, client, server and computer-readable medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |