CN109359991A - Cut-in method, device and the calculating equipment of internet of things equipment - Google Patents

Cut-in method, device and the calculating equipment of internet of things equipment Download PDF

Info

Publication number
CN109359991A
CN109359991A CN201811156795.XA CN201811156795A CN109359991A CN 109359991 A CN109359991 A CN 109359991A CN 201811156795 A CN201811156795 A CN 201811156795A CN 109359991 A CN109359991 A CN 109359991A
Authority
CN
China
Prior art keywords
equipment
accessed
authenticating transactions
transaction information
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811156795.XA
Other languages
Chinese (zh)
Inventor
刘圣文
李志超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201811156795.XA priority Critical patent/CN109359991A/en
Publication of CN109359991A publication Critical patent/CN109359991A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a kind of cut-in method of internet of things equipment, device and calculate equipment, comprising: when the distribution for detecting equipment to be accessed is requested, obtain the Transaction Information for the authenticating transactions that the equipment to be accessed is initiated into block chain;It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by the cloud platform of the equipment access Internet of Things to be accessed.The present invention program, the Transaction Information for the authenticating transactions initiated by equipment to be accessed into block chain identifies whether equipment to be accessed is legitimate device, known otherwise in compared to the prior art by the authentication information of equipment to be accessed, this identification method of the application can prevent the generation because the case where the illegality equipment cannot be accurately identified out caused by authentication information is burned onto illegality equipment, further ensure that the legitimacy of the internet of things equipment of access cloud platform.

Description

Cut-in method, device and the calculating equipment of internet of things equipment
Technical field
The present invention relates to internet of things field, and in particular to a kind of cut-in method of internet of things equipment, device and calculating Equipment.
Background technique
The continuous development of technology of Internet of things, a large amount of internet of things equipment are also given birth to therewith runing, in order to make internet of things equipment What be can be convenient is communicated with cloud platform, it is necessary to be linked into internet of things equipment very easily in cloud platform.It is same with this When, in order to ensure the legitimacy of the equipment of access cloud platform, the legitimacy of equipment need to be identified before access.Existing skill In art, the legitimacy of equipment is usually identified by the authentication information of equipment, which includes device keys, equipment identification The information such as code, specifically: in equipment factory, the authentication information of equipment being burned onto device chip, and is connect in device request During entering cloud platform, verify whether the equipment is legal by the validity of the authentication information in detection device chip Internet of things equipment;If authentication information is effective, which is accessed into cloud platform, with the communication between realization and cloud platform.
However, this verification mode in the prior art be only merely authentication information itself is verified, and due to Authentication information itself is reproducible, if also burning has effective authentication information in the chip of illegality equipment, will lead to identification As a result mistake, and then access to illegality equipment in cloud platform.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State the cut-in method, device and calculating equipment of the internet of things equipment of problem.
According to an aspect of the invention, there is provided a kind of cut-in method of internet of things equipment, comprising:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed The cloud platform of equipment access Internet of Things.
According to another aspect of the present invention, a kind of access device of internet of things equipment is provided, comprising:
Module is obtained, suitable for obtaining the equipment to be accessed to block when the distribution for detecting equipment to be accessed is requested The Transaction Information for the authenticating transactions initiated in chain;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed Internet of Things The cloud platform of net.
According to another aspect of the invention, provide a kind of calculating equipment, comprising: processor, memory, communication interface and Communication bus, the processor, the memory and the communication interface complete mutual communication by the communication bus;
For the memory for storing an at least executable instruction, it is above-mentioned that the executable instruction executes the processor The corresponding operation of the cut-in method of internet of things equipment.
In accordance with a further aspect of the present invention, provide a kind of computer storage medium, be stored in the storage medium to A few executable instruction, the executable instruction make processor execute the corresponding behaviour of cut-in method such as above-mentioned internet of things equipment Make.
The cut-in method of internet of things equipment according to the present invention, device and equipment is calculated, when detecting equipment to be accessed When distribution is requested, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by believing the transaction The authentication result of the validity of breath identifies whether equipment to be accessed is legitimate device.In the present invention, believe compared to authentication Breath, which is corresponding with the authenticating transactions currently initiated, and is not to pre-set, therefore not transreplication, The identification that the legitimacy of equipment is carried out using the Transaction Information, can prevent caused by replicating because of information that illegality equipment cannot be by The case where being recognized accurately, and the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, know Not Chu legitimate device, with ensure access cloud platform equipment legitimacy, avoid the invasion of illegality equipment.
The above description is only an overview of the technical scheme of the present invention, in order to better understand the technical means of the present invention, And it can be implemented in accordance with the contents of the specification, and in order to allow above and other objects of the present invention, feature and advantage can It is clearer and more comprehensible, the followings are specific embodiments of the present invention.
Detailed description of the invention
By reading the following detailed description of the preferred embodiment, various other advantages and benefits are common for this field Technical staff will become clear.The drawings are only for the purpose of illustrating a preferred embodiment, and is not considered as to the present invention Limitation.And throughout the drawings, the same reference numbers will be used to refer to the same parts.In the accompanying drawings:
Fig. 1 shows the flow chart of the cut-in method of internet of things equipment according to an embodiment of the invention;
Fig. 2 shows the flow charts of the cut-in method of internet of things equipment in accordance with another embodiment of the present invention;
Fig. 3 shows the functional block diagram of the access device of internet of things equipment according to an embodiment of the invention;
Fig. 4 shows a kind of structural schematic diagram for calculating equipment according to an embodiment of the present invention.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Fig. 1 shows the flow chart of the cut-in method of internet of things equipment according to an embodiment of the invention.Such as Fig. 1 institute Show, this method comprises:
Step S101: it when the distribution for detecting equipment to be accessed is requested, obtains equipment to be accessed and is initiated into block chain Authenticating transactions Transaction Information.
In the present invention, the Transaction Information for the authenticating transactions initiated by equipment to be accessed identifies the conjunction of equipment to be accessed Method.Before executing the present invention program, the block chain that can be used for carrying out authenticating transactions need to be established, including correspondence in the block chain can For the node of the receiving device as authenticating transactions, optionally, which is used as the receiving device of authenticating transactions Node is the corresponding node for executing the server or authentication platform of the present invention program.
Wherein, the Transaction Information of authenticating transactions refers to the information of the Transaction Details of reflection authenticating transactions, the authenticating transactions Transaction Information may include the characteristic attribute of the characteristic information of equipment to be accessed for initiating authenticating transactions, the receiving device of authenticating transactions Information, and/or the information, such as transaction, number of deals of transaction content of authenticating transactions etc..
Specifically, when the distribution for detecting equipment to be accessed is requested, i.e. the request of the cloud platform of access Internet of Things obtains The Transaction Information for the authenticating transactions that equipment to be accessed is initiated, to carry out the identification of the legitimacy of the equipment to be accessed.In the present invention, The concrete mode for initiating authenticating transactions is not limited, optionally, authenticating transactions can actively be initiated by equipment to be accessed, or by executing The server or authentication platform of the present invention program controls equipment to be accessed and initiates.
Step S102: it is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result.
Specifically, authenticating to the validity of authenticating transactions can be by one or more information in Transaction Information Validity is authenticated to realize, after the validity to one or more information in Transaction Information authenticates, be passed through Preset rules obtain the authentication result of authenticating transactions.Wherein, preset rules is can determine that equipment to be accessed has in area The rule of trading privilege in block chain, optionally, preset rules are the item number for the Transaction Information that limitation meets effectiveness condition Rule, or to limit the rule of the item of information for the Transaction Information for meeting effectiveness condition, the present invention is not especially limited this. For example, preset rules are that initiate the corresponding address of equipment to be accessed of authenticating transactions be effective address, it is determined that authenticating transactions are Effectively transaction.
Step S103: judge whether equipment to be accessed is legitimate device according to authentication result;If so, thening follow the steps S104;If it is not, thening follow the steps S105.
Specifically, if authentication result shows that authenticating transactions are effectively transaction, it is determined that equipment to be accessed has in block chain The middle permission for initiating effectively to trade determines equipment to be accessed then for legitimate device, then executes step S104, waiting to access this Enter equipment;If authentication result shows that authenticating transactions are invalid transaction, it is determined that equipment to be accessed does not have to be initiated in block chain The permission effectively traded then determines that equipment to be accessed for illegality equipment, executes step S105, then to prevent the equipment to be accessed Access.
Step S104: by the cloud platform of equipment to be accessed access Internet of Things.
Step S105: the cloud platform of equipment access Internet of Things to be accessed is prevented.
By step S104 and step S105, can there will be the trading right for initiating effective authenticating transactions in block chain The equipment to be accessed of limit accesses the cloud platform of Internet of Things to realize the communication of the equipment and cloud platform to be accessed;And it prevents The equipment to be accessed for not having the trading privilege for initiating effective authenticating transactions in block chain accesses cloud platform, and then may insure The legitimacy for accessing the equipment of cloud platform, avoids the invasion of illegality equipment.
According to the cut-in method of internet of things equipment provided in this embodiment, when the distribution for detecting equipment to be accessed is requested When, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by the effective of the Transaction Information The authentication result of property identifies whether equipment to be accessed is legitimate device.In the present embodiment, compared to authentication information, the friendship Easy information is corresponding with the authenticating transactions currently initiated, and is not to pre-set, therefore not transreplication utilizes the friendship Easy information carries out the identification of the legitimacy of equipment, can prevent illegality equipment caused by replicating because of information that cannot be accurately identified Out the case where, occurs, and the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, it is legal to identify Equipment avoids the invasion of illegality equipment to ensure to access the legitimacy of the equipment of cloud platform.
Fig. 2 shows the flow charts of the cut-in method of internet of things equipment in accordance with another embodiment of the present invention.Such as Fig. 2 institute Show, this method comprises:
Step S201: being that legitimate device is transferred to for authenticating friendship according to wallet address for the preset wallet address of legitimate device The logical card of easy block chain.
In the present embodiment, the trading privilege for the ease of determination equipment to be accessed in block chain, simultaneously, it is contemplated that private The participation node of chain with write-in permission be it is restricted, establish privately owned chain be used as authenticating transactions block chain.Also, In the present embodiment, only legitimate device just has the permission for initiating effective authenticating transactions.
Specifically, exist legitimate device as the form of block chain wallet, and for the preset wallet of each legitimate device Location, the preset wallet address are uniquely corresponding with legitimate device;The preset wallet address can be randomly provided, can also be according to conjunction The device parameter of method equipment is correspondingly arranged, and is the preset wallet address of legitimate device according to the authentication parameter of legitimate device optionally, The authentication parameter can be the authentication informations such as device keys, device identification;Then, block chain is transferred into preset wallet address Logical card, be used for authenticating transactions.Since private chain is not external, if not being transferred to logical card to wallet address in advance, can not send out It rises and trades, in the present embodiment, then by being transferred to logical card in the wallet address to legitimate device, so that legitimate device is specifically initiated to hand over Easy permission.
Step S202: it when the distribution for detecting equipment to be accessed is requested, obtains equipment to be accessed and is initiated into block chain Authenticating transactions Transaction Information.
Wherein, Transaction Information includes the information of the Transaction Details of any reflection authenticating transactions.In an optional embodiment In, the Transaction Information of authenticating transactions includes that the initiation addresses of authenticating transactions, authenticating transactions are transferred to address, and/or authenticating transactions Number of deals.But the present invention is not limited thereto, when it is implemented, those skilled in the art can also flexible choice it is other Reflect the information of Transaction Details as Transaction Information, to carry out the validity certification of authenticating transactions.
Specifically, when sending distribution to the cloud platform of Internet of Things by equipment to be accessed and requesting, when detecting that the distribution asks It when asking, first prevents to continue distribution, but obtains the Transaction Information for the authenticating transactions that equipment to be accessed is initiated, to carry out the conjunction of equipment The certification of method.Wherein, it (is then preset money if legitimate device that authenticating transactions, which are the corresponding wallet address of equipment to be accessed, Packet address) to arbitrary address initiate payment transaction.Further, if equipment to be accessed be legitimate device, authenticating transactions be to According to preset wallet address and logical card, any node into block chain (can execute this embodiment scheme to be corresponding to access device Server or authentication platform node) payment transaction initiated of corresponding address, it may be assumed that from preset wallet address to block chain In the transaction for producing logical card initiated of the corresponding address of any node, correspondingly, then obtaining the Transaction Information of authenticating transactions are as follows: Obtain the Transaction Information for the authenticating transactions that equipment to be accessed is initiated according to preset wallet address and logical card into block chain.It is optional , the default number of logical card is produced in the settable authenticating transactions of server, then obtains the Transaction Information of authenticating transactions are as follows: obtain to The Transaction Information of the authenticating transactions for the default number that access device is initiated according to preset wallet address and logical card into block chain.
For example, authenticating transactions are that a certain node 2 of the corresponding wallet address a1 of equipment 1 to be accessed into privately owned chain is right The wallet address a2 answered produces the payment transaction of 1 virtual coin, then the Transaction Information of the authenticating transactions obtained includes wallet address a1, Wallet address a2 and number of deals (1 virtual coin).
Further, the mode for initiating authenticating transactions, which has, actively initiates and passively initiate two kinds: mode one is actively initiated. While initiating distribution request to the cloud platform of Internet of Things by equipment to be accessed, an authenticating transactions have also actively been initiated, The mode actively initiated, so that the available Transaction Information to authenticating transactions saves while detecting distribution request The multiple interaction between the server and equipment to be accessed of this programme is executed, the effect for the legitimacy identification for improving equipment is conducive to Rate.Mode two, it is passive to initiate.After the distribution for detecting equipment to be accessed is requested, sent out according to identification demand to equipment to be accessed The acquisition request of the Transaction Information of authenticating transactions is sent, equipment to be accessed just passively initiates one after receiving the acquisition request Authenticating transactions, the mode passively initiated, the server by executing this programme are determined the need for according to identification demand by obtaining Transaction Information is taken to carry out the judgement of the legitimacy of equipment, for example, for some equipment in white list, then without knowing again Not, it can be determined directly as legitimate device, and then authenticating transactions can be initiated for identification demand, avoid passing through to be accessed set The authenticating transactions of initiating of standby blindness carry out the wasting of resources caused by the identification of equipment validity.
Step S203: it is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result.
Specifically, the validity of one or more information in Transaction Information is authenticated, and according to this or more The validity authentication result of information obtains the authentication result of authenticating transactions.It is handed over separately below with the certification that Transaction Information includes The be transferred to address and the number of deals of authenticating transactions of easy initiation address, authenticating transactions are example, to illustrate to authenticating transactions Carry out the process of validity certification:
First, authenticating to the validity of the initiation address of authenticating transactions, the corresponding authentication result for initiating address is obtained. In the present embodiment, only legitimate device could access the cloud platform of Internet of Things, and legitimate device is with preset wallet address It is unique corresponding, then the initiation address of authenticating transactions is matched with the wallet address of corresponding legitimate device, if correspondence is legal It include the initiation address of authenticating transactions in the wallet address of equipment, it is determined that the initiation address of authenticating transactions is effective address;And If not including the initiation address of authenticating transactions in the wallet address of corresponding legitimate device, it is determined that the initiation address of authenticating transactions is Invalid address, the corresponding equipment to be accessed in the address is not then legitimate device.
Second, the validity for being transferred to address to authenticating transactions authenticates, the corresponding authentication result for being transferred to address is obtained. Before the scheme for executing the present embodiment, it can predefine and be used as in the corresponding wallet address of multiple nodes of private chain The wallet address for being transferred to wallet of authenticating transactions, and these are used to carry out as the wallet address for being transferred to wallet of authenticating transactions Storage;It optionally, is the server pair for executing this embodiment scheme for the wallet address for being transferred to wallet as authenticating transactions The wallet address for the node answered.Then, the address that is transferred to of authenticating transactions is used to be transferred to money as authenticating transactions with what is stored The wallet address of packet is matched, if storage is used to hand over as in the wallet address for being transferred to wallet of authenticating transactions comprising certification Easy is transferred to address, it is determined that the address that is transferred to of authenticating transactions is effective address;And if what is stored is used for as authenticating transactions It is transferred in the wallet address of wallet and is transferred to address not comprising authenticating transactions, it is determined that the address that is transferred to of authenticating transactions is ineffectually Location.
Third, authenticating to the validity of the number of deals of authenticating transactions, the authentication result of corresponding number of deals is obtained. In the present embodiment, the logical card of block chain has only been transferred into the wallet address of legitimate device, simultaneously because being used for the conjunction of equipment The block chain of method identification is privately owned chain, and the corresponding wallet address of illegality equipment can not obtain the logical card for authenticating transactions, then Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining that the number of deals of authenticating transactions is effective Number.Wherein, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
After obtaining corresponding to the authentication result of validity of above-mentioned one or more information, authenticated according to preset rules The authentication result of transaction.Wherein, preset rules is can determine the trading privilege in block chain that equipment to be accessed has Rule.Further, which can be effective result for the authentication result of the information more than default item number, it is determined that Authenticating transactions are effectively transaction, alternatively, the authentication result that preset rules are presupposed information item is effective result, it is determined that certification is handed over It is easily effectively transaction.Optionally, it is contemplated that the private property of privately owned chain, the corresponding wallet address of illegal equipment are not present And logical card for authenticating transactions can not be obtained, then it can be simply considered that, which can not send out in privately owned chain at all Authenticating transactions are played, then the authenticating transactions that can be initiated the illegality equipment are determined as a mock trading, and do not generate substantive Transaction content (no deal number), correspondingly, preset rules are determined are as follows: if the number of deals of authenticating transactions is effective number, Then determine that authenticating transactions are effectively transaction.For example, presetting number is 1 virtual coin, and due to the corresponding wallet of illegality equipment There is no the logical cards for authenticating transactions in address (the wallet address is not preset), then number of deals is 0, not equal to default Number determines that the number of deals is invalid number.
Need it is described herein be, although it is above-mentioned only using initiate address, be transferred to address and number of deals as example carry out Explanation, but the present invention is not limited thereto, when it is implemented, those skilled in the art can also choose other items of information into The certification of row validity, to further determine that the validity of authenticating transactions.
In addition, in an optional embodiment of the present invention, in the wallet address in order to make corresponding legitimate device always There are enough logical cards to be used to initiate authenticating transactions, after obtaining the authentication result of authenticating transactions, by the logical of default number Card is retracted into the preset wallet address of corresponding equipment to be accessed.
Step S204: judge whether equipment to be accessed is legitimate device according to authentication result;If so, thening follow the steps S205;If it is not, thening follow the steps S206.
Specifically, if authentication result shows that authenticating transactions are effectively transaction, it is determined that initiate the to be accessed of authenticating transactions and set Standby is legitimate device, thens follow the steps S205;If authentication result shows that authenticating transactions are invalid transaction, it is determined that initiate certification and hand over Easy equipment to be accessed is illegality equipment, thens follow the steps S206.
Step S205: by the cloud platform of equipment to be accessed access Internet of Things.
Step S206: the cloud platform of equipment access Internet of Things to be accessed is prevented, and equipment to be accessed is added to and is illegally set In standby blacklist.
It is the preset wallet address of legitimate device, Yi Jixiang according to the cut-in method of internet of things equipment provided in this embodiment The logical card of the block chain for authenticating transactions is transferred in preset wallet address;When the distribution for detecting equipment to be accessed is requested When, the Transaction Information for the authenticating transactions that equipment to be accessed is initiated into block chain is obtained, and by one in the Transaction Information The validity of item or multinomial information is authenticated to obtain the authentication result of authenticating transactions;Then according to the certification knot of authenticating transactions Fruit identifies whether equipment to be accessed is legitimate device.In the present embodiment, compared to authentication information, which is and works as The authenticating transactions of preceding initiation are corresponding, and are not to pre-set, therefore not transreplication is set using the Transaction Information The identification of standby legitimacy can prevent the case where illegality equipment cannot be accurately identified out caused by replicating because of information hair It is raw;Also, the preset rules for passing through the trading privilege in block chain that can determine that equipment to be accessed has, recognize to determine The transaction results of transaction are demonstrate,proved, the equipment with the trading privilege for initiating effective authenticating transactions is recognized accurately, that is, are identified Legitimate device avoids the invasion of illegality equipment to ensure to access the legitimacy of the equipment of cloud platform.
Fig. 3 shows the functional block diagram of the access device of internet of things equipment according to an embodiment of the invention.Such as Fig. 3 institute Show, which includes: to obtain module 301, authentication module 302, judgment module 303, AM access module 304;Optionally, the device is also It include: to be transferred to module 305, retract module 306.
Module 301 is obtained, suitable for obtaining the equipment to be accessed to area when the distribution for detecting equipment to be accessed is requested The Transaction Information for the authenticating transactions initiated in block chain;
Authentication module 302 obtains certification knot suitable for authenticating according to validity of the Transaction Information to authenticating transactions Fruit;
Judgment module 303, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module 304 is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed object The cloud platform of networking.
In a kind of optional embodiment, described device further include:
It is transferred to module 305, is the preset wallet address of legitimate device, is that the legitimate device is transferred to according to the wallet address The logical card of block chain for authenticating transactions;
If the equipment to be accessed is legitimate device, obtains module 301 and is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over Easy Transaction Information.
It in a kind of optional embodiment, is transferred to module 305 and is further adapted for: being according to the authentication parameter of legitimate device The preset wallet address of legitimate device.
In a kind of optional embodiment, if the equipment to be accessed is legitimate device, it is further to obtain module 301 It is suitable for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain The Transaction Information of the authenticating transactions of volume.
In a kind of optional embodiment, described device further include: retract module 306, be suitable for the default number Logical card be retracted into the preset wallet address of the corresponding equipment to be accessed.
In a kind of optional embodiment, the Transaction Information of the authenticating transactions include authenticating transactions initiation address, The number of deals for being transferred to address, and/or authenticating transactions of authenticating transactions;
Then the authentication module 302 is further adapted for:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/ Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/ Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
In a kind of optional embodiment, the authentication module 302 is further adapted for:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions Easy number is effective number.
In a kind of optional embodiment, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
It can refer to the description of corresponding steps in embodiment of the method about the specific structure and working principle of above-mentioned modules, Details are not described herein again.
The embodiment of the present application provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with Connecing for the internet of things equipment in above-mentioned any means embodiment can be performed in an at least executable instruction, the computer executable instructions Enter method.
Fig. 4 shows a kind of structural schematic diagram for calculating equipment according to an embodiment of the present invention, the specific embodiment of the invention The specific implementation for calculating equipment is not limited.
As shown in figure 4, the calculating equipment may include: processor (processor) 402, communication interface (Communications Interface) 404, memory (memory) 406 and communication bus 408.
Wherein:
Processor 402, communication interface 404 and memory 406 complete mutual communication by communication bus 408.
Communication interface 404, for being communicated with the network element of other equipment such as client or other servers etc..
Processor 402 can specifically execute the cut-in method embodiment of above-mentioned internet of things equipment for executing program 410 In correlation step.
Specifically, program 410 may include program code, which includes computer operation instruction.
Processor 402 may be central processor CPU or specific integrated circuit ASIC (Application Specific Integrated Circuit), or be arranged to implement the integrated electricity of one or more of the embodiment of the present invention Road.The one or more processors that equipment includes are calculated, can be same type of processor, such as one or more CPU;It can also To be different types of processor, such as one or more CPU and one or more ASIC.
Memory 406, for storing program 410.Memory 406 may include high speed RAM memory, it is also possible to further include Nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.
Program 410 specifically can be used for so that processor 402 executes following operation:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed The cloud platform of equipment access Internet of Things.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following Operation: being that the legitimate device is transferred to for authenticating transactions according to the wallet address for the preset wallet address of legitimate device The logical card of block chain;
If the equipment to be accessed is legitimate device, the equipment to be accessed is obtained according to preset wallet address and described The Transaction Information for the authenticating transactions that logical card is initiated into block chain.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following Operation: being the preset wallet address of legitimate device according to the authentication parameter of legitimate device.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following Operation: if the equipment to be accessed is legitimate device, the equipment to be accessed is obtained according to preset wallet address and described logical Demonstrate,prove the Transaction Information of the authenticating transactions for the default number initiated into block chain.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following Operation:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
In a kind of optional embodiment, the Transaction Information of the authenticating transactions include authenticating transactions initiation address, The number of deals for being transferred to address, and/or authenticating transactions of authenticating transactions;
Program 410 can specifically be further used for so that processor 402 executes following operation: to the initiations of authenticating transactions The validity of location is authenticated, and the corresponding authentication result for initiating address is obtained;And/or
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/ Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
In a kind of optional embodiment, program 410 can specifically be further used for so that processor 402 execute it is following Operation:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions Easy number is effective number.
In a kind of optional embodiment, effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included certain features rather than other feature, but the combination of the feature of different embodiments mean it is of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed Meaning one of can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice In the access device of microprocessor or digital signal processor (DSP) to realize internet of things equipment according to an embodiment of the present invention Some or all components some or all functions.The present invention is also implemented as executing side as described herein Some or all device or device programs (for example, computer program and computer program product) of method.It is such It realizes that program of the invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from an internet website to obtain, and perhaps be provided on the carrier signal or with any other shape Formula provides.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
The invention discloses: a kind of cut-in method of internet of things equipment of A1., comprising:
When the distribution for detecting equipment to be accessed is requested, the certification that the equipment to be accessed is initiated into block chain is obtained The Transaction Information of transaction;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by described to be accessed The cloud platform of equipment access Internet of Things.
A2. method according to a1, wherein in the certification for obtaining the equipment to be accessed and being initiated into block chain Before the Transaction Information of transaction, the method also includes: it is institute according to the wallet address for the preset wallet address of legitimate device State the logical card for the block chain that legitimate device is transferred to for authenticating transactions;
If the equipment to be accessed is legitimate device, obtains the certification that the equipment to be accessed is initiated into block chain and hand over Easy Transaction Information further comprises:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over Easy Transaction Information.
A3. the method according to A2, wherein for the preset wallet of legitimate device according to the authentication parameter of legitimate device Location.
A4. the method according to A2 or A3, wherein if the equipment to be accessed is legitimate device, the acquisition institute The Transaction Information for stating the authenticating transactions that equipment to be accessed is initiated into block chain further comprises:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain The Transaction Information of the authenticating transactions of volume.
A5. method according to a4, wherein carried out described according to validity of the Transaction Information to authenticating transactions Certification, after obtaining authentication result, the method also includes:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
A6. method according to a5, wherein the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
It is then described to be authenticated according to validity of the Transaction Information to authenticating transactions, it obtains authentication result and further wraps It includes:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/ Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/ Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
A7. the method according to A6, wherein the validity of the number of deals to authenticating transactions authenticates, and obtains Authentication result to corresponding number of deals further comprises:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions Easy number is effective number.
A8. the method according to A7, wherein effectiveness condition is that the number of deals of authenticating transactions is equal to default number.
The invention also discloses: a kind of access device of internet of things equipment of B9., comprising:
Module is obtained, suitable for obtaining the equipment to be accessed to block when the distribution for detecting equipment to be accessed is requested The Transaction Information for the authenticating transactions initiated in chain;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then the equipment to be accessed is accessed Internet of Things The cloud platform of net.
B10. the device according to B9, wherein described device further include:
It is transferred to module, is the preset wallet address of legitimate device, is that the legitimate device is transferred to use according to the wallet address In the logical card of the block chain of authenticating transactions;
If the equipment to be accessed is legitimate device, obtains module and is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,prove the certification initiated into block chain and hands over Easy Transaction Information.
B11. device according to b10, wherein be transferred to module and be further adapted for: according to the authentication parameter of legitimate device For the preset wallet address of legitimate device.
B12. device according to b10 or b11, wherein if the equipment to be accessed is legitimate device, obtain module It is further adapted for:
The equipment to be accessed is obtained according to preset wallet address and described logical demonstrate,proves the present count initiated into block chain The Transaction Information of the authenticating transactions of volume.
B13. device according to b12, wherein described device further include: retract module, be suitable for the default number Logical card be retracted into the preset wallet address of the corresponding equipment to be accessed.
B14. device according to b13, wherein the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
Then the authentication module is further adapted for:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;With/ Or,
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;With/ Or,
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
B15. device according to b14, wherein the authentication module is further adapted for:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the friendship of the authenticating transactions Easy number is effective number.
B16. the device according to B15, wherein effectiveness condition is that the number of deals of authenticating transactions is equal to present count Volume.
The invention also discloses: a kind of calculating equipment of C17., comprising: processor, memory, communication interface and communication are total Line, the processor, the memory and the communication interface complete mutual communication by the communication bus;
The memory executes the processor such as storing an at least executable instruction, the executable instruction The corresponding operation of the cut-in method of internet of things equipment described in any one of A1-A8.
The invention also discloses a kind of computer storage medium of D18., being stored at least one in the storage medium can be held Row instruction, the cut-in method pair for the internet of things equipment that the executable instruction executes processor as described in any one of A1-A8 The operation answered.

Claims (10)

1. a kind of cut-in method of internet of things equipment, comprising:
When the distribution for detecting equipment to be accessed is requested, the authenticating transactions that the equipment to be accessed is initiated into block chain are obtained Transaction Information;
It is authenticated according to validity of the Transaction Information to authenticating transactions, obtains authentication result;
Judge whether the equipment to be accessed is legitimate device according to the authentication result;If so, by the equipment to be accessed Access the cloud platform of Internet of Things.
2. according to the method described in claim 1, wherein, recognizing what the acquisition equipment to be accessed was initiated into block chain Before the Transaction Information for demonstrate,proving transaction, the method also includes: for the preset wallet address of legitimate device, it is according to the wallet address The legitimate device is transferred to the logical card of the block chain for authenticating transactions;
If the equipment to be accessed is legitimate device, the authenticating transactions that the equipment to be accessed is initiated into block chain are obtained Transaction Information further comprises:
The equipment to be accessed is obtained according to preset wallet address and the logical authenticating transactions initiated into block chain of demonstrate,proving Transaction Information.
3. according to the method described in claim 2, wherein, for the preset wallet of legitimate device according to the authentication parameter of legitimate device Location.
4. according to the method in claim 2 or 3, wherein if the equipment to be accessed is legitimate device, the acquisition institute The Transaction Information for stating the authenticating transactions that equipment to be accessed is initiated into block chain further comprises:
The equipment to be accessed is obtained according to preset wallet address and the logical default number initiated into block chain of demonstrate,proving The Transaction Information of authenticating transactions.
5. according to the method described in claim 4, wherein, it is described according to the Transaction Information to the validity of authenticating transactions into Row certification, after obtaining authentication result, the method also includes:
The logical card of the default number is retracted into the preset wallet address of the corresponding equipment to be accessed.
6. according to the method described in claim 5, wherein, the Transaction Information of the authenticating transactions includes the initiation of authenticating transactions Location, authenticating transactions the number of deals for being transferred to address, and/or authenticating transactions;
Then described to be authenticated according to validity of the Transaction Information to authenticating transactions, obtaining authentication result further comprises:
The validity of the initiation address of authenticating transactions is authenticated, the corresponding authentication result for initiating address is obtained;And/or
The validity for being transferred to address of authenticating transactions is authenticated, the corresponding authentication result for being transferred to address is obtained;And/or
The validity of the number of deals of authenticating transactions is authenticated, the authentication result of corresponding number of deals is obtained.
7. according to the method described in claim 6, wherein, the validity of the number of deals to authenticating transactions authenticates, The authentication result for obtaining corresponding number of deals further comprises:
Judge whether the number of deals of authenticating transactions meets effectiveness condition, if so, determining the number of deals of the authenticating transactions Volume is effective number.
8. a kind of access device of internet of things equipment, comprising:
Module is obtained, suitable for obtaining the equipment to be accessed into block chain when the distribution for detecting equipment to be accessed is requested The Transaction Information of the authenticating transactions of initiation;
Authentication module obtains authentication result suitable for authenticating according to validity of the Transaction Information to authenticating transactions;
Judgment module, suitable for judging whether the equipment to be accessed is legitimate device according to the authentication result;
AM access module is adapted to determine that the equipment to be accessed is legitimate device, then by the equipment access Internet of Things to be accessed Cloud platform.
9. a kind of calculating equipment, comprising: processor, memory, communication interface and communication bus, the processor, the storage Device and the communication interface complete mutual communication by the communication bus;
The memory executes the processor as right is wanted for storing an at least executable instruction, the executable instruction Ask the corresponding operation of the cut-in method of internet of things equipment described in any one of 1-7.
10. a kind of computer storage medium, an at least executable instruction, the executable instruction are stored in the storage medium Processor is set to execute the corresponding operation of cut-in method such as internet of things equipment of any of claims 1-7.
CN201811156795.XA 2018-09-30 2018-09-30 Cut-in method, device and the calculating equipment of internet of things equipment Pending CN109359991A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811156795.XA CN109359991A (en) 2018-09-30 2018-09-30 Cut-in method, device and the calculating equipment of internet of things equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811156795.XA CN109359991A (en) 2018-09-30 2018-09-30 Cut-in method, device and the calculating equipment of internet of things equipment

Publications (1)

Publication Number Publication Date
CN109359991A true CN109359991A (en) 2019-02-19

Family

ID=65348519

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811156795.XA Pending CN109359991A (en) 2018-09-30 2018-09-30 Cut-in method, device and the calculating equipment of internet of things equipment

Country Status (1)

Country Link
CN (1) CN109359991A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113355A (en) * 2019-05-22 2019-08-09 北京安护环宇科技有限公司 The cut-in method and device in Internet of Things cloud
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065430A (en) * 2010-12-28 2011-05-18 上海华御信息技术有限公司 Method for realizing safe access of terminal of internet of thing
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN108306887A (en) * 2018-02-05 2018-07-20 徐正伟 Internet of Things safety based on block chain protects system with data-privacy
US20180270608A1 (en) * 2017-03-17 2018-09-20 SCRRD, Inc. Wireless Device Detection, Tracking, and Authentication Platform and Techniques

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102065430A (en) * 2010-12-28 2011-05-18 上海华御信息技术有限公司 Method for realizing safe access of terminal of internet of thing
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
US20180270608A1 (en) * 2017-03-17 2018-09-20 SCRRD, Inc. Wireless Device Detection, Tracking, and Authentication Platform and Techniques
CN108306887A (en) * 2018-02-05 2018-07-20 徐正伟 Internet of Things safety based on block chain protects system with data-privacy

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110113355A (en) * 2019-05-22 2019-08-09 北京安护环宇科技有限公司 The cut-in method and device in Internet of Things cloud
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN111131286B (en) * 2019-12-30 2022-06-17 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points

Similar Documents

Publication Publication Date Title
CN106339875B (en) Operation note checking method and device based on publicly-owned block chain
CN109815657B (en) Identity authentication method and device based on alliance chain, computer readable storage medium and terminal equipment
CN110428257B (en) Password cracking task processing method, equipment and storage medium
CN109981679B (en) Method and apparatus for performing transactions in a blockchain network
CN108492180B (en) Asset management method and device and electronic equipment
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
CN108898389A (en) Based on the content verification method and device of block chain, electronic equipment
AU2019295815A1 (en) Blockchain-based data verification method and apparatus, and electronic device
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
CN106357612A (en) Method and device for review of authentication records based on public block chains
CN108960825A (en) Electric endorsement method and device, electronic equipment based on block chain
CN109409885A (en) Across chain method of commerce, device and storage medium on block chain
CN108898021B (en) Threat information processing method, system and computing device based on block chain
US20210049715A1 (en) Blockchain-based data procesing method, apparatus, and electronic device
WO2015116998A2 (en) Electronic transfer and obligation enforcement system
CN109600366A (en) The method and device of protection user data privacy based on block chain
CN110210207A (en) Authorization method and equipment
Liu et al. Smacs: smart contract access control service
CN110247857A (en) Current-limiting method and device
CN108769057A (en) Personal identification method based on block chain and device
CN109359991A (en) Cut-in method, device and the calculating equipment of internet of things equipment
CN111738724A (en) Cross-border resource transfer authenticity auditing method and device, and electronic equipment
CN104375935B (en) The test method and device of SQL injection attack
CN112181599B (en) Model training method, device and storage medium
CN108881132A (en) Using authorization method, client, server and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination