CN110650057B - Method and system for configuring equipment through portable mobile terminal - Google Patents

Method and system for configuring equipment through portable mobile terminal Download PDF

Info

Publication number
CN110650057B
CN110650057B CN201910947277.8A CN201910947277A CN110650057B CN 110650057 B CN110650057 B CN 110650057B CN 201910947277 A CN201910947277 A CN 201910947277A CN 110650057 B CN110650057 B CN 110650057B
Authority
CN
China
Prior art keywords
dtu
uuid
mobile terminal
equipment
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910947277.8A
Other languages
Chinese (zh)
Other versions
CN110650057A (en
Inventor
周厚明
张朋飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Maiwei Communications Co ltd
Original Assignee
Wuhan Maiwei Communications Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Maiwei Communications Co ltd filed Critical Wuhan Maiwei Communications Co ltd
Priority to CN201910947277.8A priority Critical patent/CN110650057B/en
Publication of CN110650057A publication Critical patent/CN110650057A/en
Application granted granted Critical
Publication of CN110650057B publication Critical patent/CN110650057B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Abstract

The invention relates to a method for configuring equipment through a portable mobile terminal, which comprises the following steps: step 1, establishing a physical link between a mobile terminal and DTU equipment through switching equipment; step 2, after the mobile terminal judges that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, and the authentication information is obtained in an encryption out-of-band mode; and 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment. A local data link between the mobile terminal and the DTU is established, and the mobile terminal is small and portable, so that the burden of an installer is reduced; and then, safety certification is completed based on local connection, and only authorized users can modify the equipment parameters to carry out configuration work.

Description

Method and system for configuring equipment through portable mobile terminal
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and a system for configuring a device through a portable mobile terminal.
Background
A DTU (Data Transfer unit) device is a device having an RS232 or RS485 interface, and also has a mobile communication module; the device sends data from the RS232 or RS485 interface to a designated server on the Internet through the mobile communication module; and meanwhile, data from the server can be forwarded to an RS232 or RS485 interface.
Before using the DTU device, serial port parameters of an RS232 or RS485 interface must be configured correctly, and relevant parameters (such as an IP address, a port and the like) of a server needing to be connected are specified.
In the prior art, a method for configuring a DTU device includes: 1) and providing a PC end program, connecting the PC with the DTU equipment through a serial port line, and sending a special command to the DTU equipment to complete parameter configuration work. The method needs to be configured through a PC, and no encryption or authentication mechanism is adopted in general serial communication, so that a manufacturer can very easily modify DTU equipment to promote products because a configuration command is open on the Internet, and the DTU equipment cannot normally work. 2) The mobile terminal and the DTU equipment are connected to the same server through the Internet, and parameter modification work is completed through a server transfer instruction. 3) The method has no relevant authentication mechanism, and any person can modify the parameters as long as knowing the mobile phone number of the DTU mobile module, so that potential safety hazards exist.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides a method and a system for configuring equipment through a portable mobile terminal, and solves the problem of potential safety hazard in equipment configuration.
The technical scheme for solving the technical problems is as follows: a method of configuring a device via a portable mobile terminal, comprising:
step 1, establishing a physical link between a mobile terminal and DTU equipment through switching equipment;
step 2, after the mobile terminal judges that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, and the authentication information is obtained in an encryption out-of-band mode;
and 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment.
A system for configuring a device via a portable mobile terminal, comprising: the system comprises switching equipment, an authentication information sending module and a configuration module;
the switching equipment is used for establishing a physical link between the mobile terminal and the DTU equipment;
the authentication information sending module is used for sending authentication information to corresponding DTU equipment after the mobile terminal judges that the received login information passes authentication, and the authentication information is obtained in an encrypted out-of-band mode;
and the configuration module is used for receiving the configuration information sent by the mobile terminal to configure the DTU equipment after the DTU equipment judges that the received authentication information passes the authentication.
The invention has the beneficial effects that: a local data link between the mobile terminal and the DTU is established, and the mobile terminal is small and portable, so that the burden of an installer is reduced; and then, safety certification is completed based on local connection, and only authorized users can modify the equipment parameters to carry out configuration work.
On the basis of the technical scheme, the invention can be further improved as follows.
Further, the authentication information is a UUID key of the DTU device;
the UUID of the DTU equipment is obtained by encrypting after the SN code and the IMEI of the DTU equipment are combined;
and the UUID key of the DTU equipment is obtained after the UUID is processed or is distributed by a server.
Further, when the DTU equipment is authenticated with the server for the first time or is restored to factory settings after the DTU equipment is authenticated with the server, the UUID key is obtained by processing the UUID;
and when the DTU equipment completes authentication and connection with the server, the UUID key is obtained by the server distribution.
Further, the step 3 of determining, by the DTU device, whether the received authentication information is successfully authenticated includes:
step 301, generating a UUID when the DTU device is started, and generating the UUIDkey according to the UUID or obtaining the UUID key from the server;
step 302, the mobile terminal obtains the UUID index of the DTU device and the corresponding UUID in an out-of-band manner, and sends request connection information to the DTU device;
step 303, the DTU device sends the UUID key index to the mobile terminal after receiving the connection request information;
step 304, the mobile terminal sends the corresponding UUID key to the DTU equipment according to the UUID key index;
and 305, the DTU equipment determines whether to interrupt the authentication process according to whether the received UUID key is correct or not.
Further, in step 303, the DTU device further sends information on whether the source of the UUID key is the server to the mobile terminal;
in step 304, the mobile terminal receives information whether the source of the UUID key is the server, and updates the UUID index of the DTU device and the corresponding UUID in an out-of-band manner if necessary.
Further, after the DTU device determines that the UUID key of the mobile terminal is correct in step 305, the correctness of the key is also determined;
and the key is generated by combining the UUID of the DTU equipment, the communication protocol version of the mobile terminal and the communication protocol version of the DTU equipment.
Further, the connection request information sent by the mobile terminal to the DTU device in step 302 includes: a mobile terminal communication protocol version;
in step 305, after the DTU device determines that the UUID key is correct, the method further includes:
step 306, the DTU equipment sends information of whether the mobile terminal is in a factory state, a DTU equipment communication protocol version and the UUID to the mobile terminal;
307, the mobile terminal generates a key according to the combination of the UUID of the DTU equipment, the communication protocol version of the mobile terminal and the communication protocol version of the DTU equipment, and sends the key encrypted by MD5 to the DTU equipment;
step 308, when the DTU device determines that the key is correct, it confirms that the authentication is passed; and interrupting the authentication process when the key is judged to be wrong.
The beneficial effect of adopting the further scheme is that: after a local data link between the mobile terminal and the DTU is established, handshake messages are exchanged, when the DTU equipment authenticates authentication information respectively when a factory state is authenticated for the first time, when the DTU equipment completes authentication and connection with the server and when the DTU equipment is restored to factory settings after the DTU equipment completes authentication, the authentication information is generated or obtained from the server according to the UUID key, the correctness of a secret key is judged after the authentication information passes, and after the authentication is passed, the next step can be continued; otherwise, the whole process is exited, so that the whole authentication process is safer.
Drawings
Fig. 1 is a flowchart illustrating a method for configuring a device via a portable mobile terminal according to the present invention;
fig. 2 is an authentication flowchart of the DTU device according to the embodiment of the present invention when the DTU device is first authenticated in a factory state;
fig. 3 is an authentication flowchart of a DTU device when completing authentication and connection with a server according to an embodiment of the present invention;
fig. 4 is an authentication flowchart of the DTU device according to the embodiment of the present invention when the DTU device is restored to factory settings after completing authentication with the server;
fig. 5 is a block diagram illustrating a configuration of a system for configuring a device via a portable mobile terminal according to an embodiment of the present invention;
fig. 6 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
In the drawings, the components represented by the respective reference numerals are listed below:
101. the system comprises a switching device 102, an authentication information sending module 103, a configuration module 201, a processor 202, a communication interface 203, a memory 204 and a communication bus.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
Fig. 1 is a flowchart illustrating a method for configuring a device through a portable mobile terminal according to the present invention, and as can be seen from fig. 1, the method includes:
step 1, a physical link between the mobile terminal and the DTU equipment is established through the switching equipment.
And 2, after judging that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, wherein the authentication information is acquired in an encryption out-of-band mode.
And 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment.
According to the method for configuring the equipment through the portable mobile terminal, the local data link between the mobile terminal and the DTU is established, the mobile terminal is small and exquisite and portable, and the burden of an installer is reduced; and then, safety certification is completed based on local connection, and only authorized users can modify the equipment parameters to carry out configuration work.
Example 1
Embodiment 1 provided in the present invention is an embodiment of a method for configuring a device by a portable mobile terminal, and the embodiment includes:
step 1, a physical link between the mobile terminal and the DTU equipment is established through the switching equipment.
Specifically, the DTU equipment has an RS232/RS485 serial port, the portable mobile terminal has one or more communication modes of a USB port, Wi-Fi, Bluetooth and NFC, the switching equipment is set according to the DTU equipment and the mobile terminal interface or the communication mode, and the switching equipment can be specifically as follows:
USB changes RS232/RS485 serial ports device: for example, the Type C interface of the switching device is connected with the Type C interface of the mobile terminal, and the RS232/RS485 interface is connected with the RS232/RS485 interface of the DTU device.
The RS232/RS485 serial port-to-Bluetooth device comprises: the switching equipment is connected with the mobile terminal through Bluetooth and is connected with the DTU equipment through an RS232/RS485 serial port.
The RS232/RS485 serial port is converted into an NFC device: the switching equipment is connected with the mobile terminal through NFC and is connected with the DTU equipment through an RS232/RS485 serial port.
And 2, after judging that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, wherein the authentication information is acquired in an encryption out-of-band mode.
Specifically, a professional program in the form of an APP or an applet may be installed on the mobile terminal, and an operator sends login information in the form of an account password or a biometric technology (face recognition/fingerprint recognition), so as to complete login authentication of a login-specific program.
The mode of obtaining the authentication information in the encryption out-of-band mode can be that the headquarters sends information in the format of encrypted authentication two-dimensional codes and the like of the equipment to the operator in advance in the modes of mails, telephones, short messages and the like.
Specifically, the authentication information may be a UUID (universal Unique Identifier) key of the DTU device, and the UUID of the DTU device may be obtained by combining an SN code of the DTU device and an IMEI (International Mobile Equipment Identity) and encrypting the SN code. The UUID key of the DTU equipment can be obtained after the UUID is processed or distributed by the server.
Specifically, as shown in fig. 2, fig. 3, and fig. 4 are authentication flowcharts of the DTU device when the DTU device is authenticated for the first time in a factory state, when the DTU device completes authentication and connection with the server, and when the DTU device is restored to the factory setting after the DTU device completes authentication, respectively, as can be seen from fig. 2, fig. 3, and fig. 4, an embodiment of the method for acquiring a UUID of the DTU device may be:
and acquiring 12-bit SN codes of the DTU equipment.
The IMEI of the mobile cellular module of the DTU device is obtained, typically consisting of 15-17 digits.
The new character string is composed of SN code and IMEI:
Figure GDA0003357492680000071
and performing MD5 encryption on the generated new character string to obtain the UUID of the DTU device with 16 bytes.
And when the DTU equipment is authenticated with the server for the first time or is restored to factory settings after the DTU equipment is authenticated with the server, the UUID key is obtained after the UUID is processed. And when the DTU equipment completes authentication and connection with the server, the UUID key is obtained through server distribution. Specifically, the method for obtaining the UUID key after processing the UUID may be:
and deleting the 1 st, 8 th and 15 th bit characters of the UUID of the DTU equipment with 16 bytes to obtain a new character string.
And performing MD5 encryption on the new character string to obtain a UUID key.
And 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment.
The process that the DTU device determines whether the received authentication information is successfully authenticated in step 3 includes:
step 301, generating a UUID when the DTU device is started, and generating a UUID key according to the UUID or obtaining the UUID key from the server.
Step 302, the mobile terminal obtains the UUID index of the DTU device and the corresponding UUID through an out-of-band manner, and sends request connection information to the DTU device.
The UUID key index may be the 12-bit SN encoding of the DTU device.
Step 303, the DTU device sends the UUID key index to the mobile terminal after receiving the connection request message.
And step 304, the mobile terminal sends the corresponding UUID key to the DTU equipment according to the UUID key index.
And 305, the DTU equipment determines whether to interrupt the authentication process according to whether the received UUID key is correct or not.
Further, in step 303, the DTU device sends information whether the source of the UUID key is the server to the mobile terminal.
In step 304, the mobile terminal receives information whether the source of the UUID key is the server, and updates the UUID index of the DTU device and the corresponding UUID in an out-of-band manner if necessary.
Specifically, when the DTU device is in a factory state and is authenticated for the first time, the source of the UUID key is not the server, and at this time, the UUID index and the corresponding UUID of the DTU device do not need to be updated.
When the DTU equipment and the server finish authentication and connection, the source of the UUID key is the server, and at the moment, the mobile terminal updates the UUID index of the DTU equipment and the corresponding UUID in an out-of-band mode when needed.
When the factory setting is restored after the DTU equipment and the server finish authentication, the source of the UUID key is not the server, the mobile terminal judges that the source of the UUID key is wrong after receiving the message, informs the server that the DTU equipment restores the factory setting, and updates the UUID index of the DTU equipment and the corresponding UUID.
Preferably, in an embodiment of the method for configuring the device through the portable mobile terminal provided by the present invention, after the DTU device determines that the UUID key of the mobile terminal is correct, the DTU device further determines the correctness of the key, where the key is generated by combining the UUID of the DTU device, the communication protocol version of the mobile terminal, and the communication protocol version of the DTU device.
Specifically, the connection request information sent by the mobile terminal to the DTU device in step 302 includes the mobile terminal information and the mobile terminal communication protocol version.
In step 305, after the DTU device determines that the UUID key is correct, the method further includes:
step 306, the DTU device sends information of whether the mobile terminal is in a factory state, a communication protocol version of the DTU device and a UUID to the mobile terminal.
And 307, the mobile terminal generates a key according to the combination of the UUID of the DTU equipment, the communication protocol version of the mobile terminal and the communication protocol version of the DTU equipment, and sends the key encrypted by the MD5 to the DTU equipment.
And 308, when the DTU equipment judges that the secret key is correct, the authentication is confirmed to pass, and when the secret key is judged to be wrong, the authentication process is interrupted.
After the authentication is completed, the mobile terminal and the DTU equipment perform operations such as equipment state checking, equipment configuration and the like according to a predefined protocol.
The management instruction format is as follows:
Figure GDA0003357492680000091
the data frame format is as follows:
Figure GDA0003357492680000092
example 2
Embodiment 2 provided by the present invention is a system for configuring a device through a portable mobile terminal, and as shown in fig. 5, is a block diagram of a structure of the system for configuring a device through a portable mobile terminal, and as can be seen from fig. 5, the system includes: the system comprises a switching device 101, an authentication information sending module 102 and a configuration module 103.
The transit device 101 is used for establishing a physical link between the mobile terminal and the DTU device.
And the authentication information sending module 102 is configured to send authentication information to the corresponding DTU device after the mobile terminal determines that the received login information is authenticated, where the authentication information is obtained in an encrypted out-of-band manner.
And the configuration module 103 is configured to receive the configuration information sent by the mobile terminal to configure the DTU device after the DTU device determines that the received authentication information passes authentication.
It should be noted that, the system provided in the embodiment of the present invention specifically executes the method in each of the above embodiments, and details of the method in each of the above embodiments are described in detail, which are not described again in the embodiment of the present invention.
Fig. 6 is a schematic entity structure diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 6, the electronic device may include: the system comprises a processor 201, a communication interface 202, a memory 203 and a communication bus 204, wherein the processor 201, the communication interface 202 and the memory 203 are communicated with each other through the communication bus 204. The processor 201 may invoke a computer program stored on the memory 203 and operable on the processor 201 to perform the method for configuring a device by a portable mobile terminal provided by the above embodiments, for example, including: step 1, a physical link between the mobile terminal and the DTU equipment is established through the switching equipment. And 2, after judging that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, wherein the authentication information is acquired in an encryption out-of-band mode. And 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment.
Embodiments of the present invention also provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to, when executed by a processor, perform the method for configuring a device through a portable mobile terminal provided in the foregoing embodiments, for example, including: step 1, a physical link between the mobile terminal and the DTU equipment is established through the switching equipment. And 2, after judging that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, wherein the authentication information is acquired in an encryption out-of-band mode. And 3, after the DTU equipment judges that the received authentication information passes the authentication, receiving the configuration information sent by the mobile terminal to configure the DTU equipment.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (8)

1. A method for configuring a device via a portable mobile terminal, the method comprising:
step 1, establishing a physical link between a mobile terminal and a data conversion unit DTU device through a switching device;
step 2, after the mobile terminal judges that the received login information passes the authentication, the mobile terminal sends authentication information to corresponding DTU equipment, and the authentication information is obtained in an encryption out-of-band mode;
step 3, after the DTU equipment judges that the received authentication information passes the authentication, the DTU equipment receives the configuration information sent by the mobile terminal to configure the DTU equipment;
the authentication information is a UUID key of the DTU equipment;
the UUID of the DTU equipment is obtained by encrypting after the SN code and the IMEI of the DTU equipment are combined;
the UUID key of the DTU equipment is obtained after the UUID is processed or is obtained by server distribution;
the step 3 of determining, by the DTU device, whether the received authentication information passes the authentication includes:
step 301, generating a UUID when the DTU device is started, and generating the UUID key according to the UUID or obtaining the UUID key from the server;
step 302, the mobile terminal obtains the UUID index of the DTU device and the corresponding UUID in an out-of-band manner, and sends request connection information to the DTU device;
step 303, the DTU device sends the UUID key index to the mobile terminal after receiving the connection request information;
step 304, the mobile terminal sends the corresponding UUID key to the DTU equipment according to the UUID key index;
and 305, the DTU equipment determines whether to interrupt the authentication process according to whether the received UUID key is correct or not.
2. The method of claim 1, wherein when the DTU device is authenticated with the server for the first time or is restored to factory settings after the authentication with the server is completed, the UUID key is obtained by processing the UUID;
and when the DTU equipment completes authentication and connection with the server, the UUID key is obtained by the server distribution.
3. The method of claim 1, wherein the DTU device in step 303 further sends information whether the source of the UUID key is the server to the mobile terminal;
in step 304, the mobile terminal receives information whether the source of the UUID key is the server, and updates the UUID index of the DTU device and the corresponding UUID in an out-of-band manner if necessary.
4. The method according to claim 1, wherein in step 305, after the DTU device determines that the UUID key of the mobile terminal is correct, the DTU device further determines correctness of the key;
and the key is generated by combining the UUID of the DTU equipment, the communication protocol version of the mobile terminal and the communication protocol version of the DTU equipment.
5. The method of claim 1, wherein the connection request information sent by the mobile terminal to the DTU device in step 302 comprises: a mobile terminal communication protocol version;
in step 305, after the DTU device determines that the UUID key is correct, the method further includes:
step 306, the DTU equipment sends information of whether the mobile terminal is in a factory state, a DTU equipment communication protocol version and the UUID to the mobile terminal;
307, the mobile terminal generates a key according to the combination of the UUID of the DTU equipment, the communication protocol version of the mobile terminal and the communication protocol version of the DTU equipment, and sends the key encrypted by MD5 to the DTU equipment;
step 308, when the DTU device determines that the key is correct, it confirms that the authentication is passed; and interrupting the authentication process when the key is judged to be wrong.
6. A system for configuring a device via a portable mobile terminal, the system comprising: the system comprises switching equipment, an authentication information sending module and a configuration module;
the switching equipment is used for establishing a physical link between the mobile terminal and the data conversion unit DTU equipment;
the authentication information sending module is used for sending authentication information to corresponding DTU equipment after the mobile terminal judges that the received login information passes authentication, and the authentication information is obtained in an encrypted out-of-band mode;
the configuration module is used for receiving the configuration information sent by the mobile terminal to configure the DTU equipment after the DTU equipment judges that the received authentication information passes the authentication;
the authentication information is a UUID key of the DTU equipment;
the UUID of the DTU equipment is obtained by encrypting after the SN code and the IMEI of the DTU equipment are combined;
the UUID key of the DTU equipment is obtained after the UUID is processed or is obtained by server distribution;
the process that the DTU equipment judges whether the received authentication information passes the authentication comprises the following steps:
step 301, generating a UUID when the DTU device is started, and generating the UUID key according to the UUID or obtaining the UUID key from the server;
step 302, the mobile terminal obtains the UUID index of the DTU device and the corresponding UUID in an out-of-band manner, and sends request connection information to the DTU device;
step 303, the DTU device sends the UUID key index to the mobile terminal after receiving the connection request information;
step 304, the mobile terminal sends the corresponding UUID key to the DTU equipment according to the UUID key index;
and 305, the DTU equipment determines whether to interrupt the authentication process according to whether the received UUID key is correct or not.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method for configuring a device by means of a portable mobile terminal according to any of claims 1 to 5 are implemented by the processor executing the program.
8. A non-transitory computer readable storage medium, having a computer program stored thereon, wherein the computer program, when being executed by a processor, is adapted to carry out the steps of the method of configuring a device by a portable mobile terminal according to any of claims 1 to 5.
CN201910947277.8A 2019-09-29 2019-09-29 Method and system for configuring equipment through portable mobile terminal Active CN110650057B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910947277.8A CN110650057B (en) 2019-09-29 2019-09-29 Method and system for configuring equipment through portable mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910947277.8A CN110650057B (en) 2019-09-29 2019-09-29 Method and system for configuring equipment through portable mobile terminal

Publications (2)

Publication Number Publication Date
CN110650057A CN110650057A (en) 2020-01-03
CN110650057B true CN110650057B (en) 2022-03-11

Family

ID=68993643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910947277.8A Active CN110650057B (en) 2019-09-29 2019-09-29 Method and system for configuring equipment through portable mobile terminal

Country Status (1)

Country Link
CN (1) CN110650057B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111343658A (en) * 2020-03-16 2020-06-26 深圳市智创纪元科技有限公司 Remote wireless configuration serial port 4G networking system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106471831A (en) * 2014-09-30 2017-03-01 华为技术有限公司 The method of configuration, the device of configuration and equipment
CN107736046A (en) * 2015-06-05 2018-02-23 高通股份有限公司 The flexible configuration of wireless device and certification

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9749131B2 (en) * 2014-07-31 2017-08-29 Nok Nok Labs, Inc. System and method for implementing a one-time-password using asymmetric cryptography
US9455979B2 (en) * 2014-07-31 2016-09-27 Nok Nok Labs, Inc. System and method for establishing trust using secure transmission protocols
CN104506509B (en) * 2014-12-15 2018-06-19 广东汇卡商务服务有限公司 A kind of authentication method based on multifunctional safe certification terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106471831A (en) * 2014-09-30 2017-03-01 华为技术有限公司 The method of configuration, the device of configuration and equipment
CN107736046A (en) * 2015-06-05 2018-02-23 高通股份有限公司 The flexible configuration of wireless device and certification

Also Published As

Publication number Publication date
CN110650057A (en) 2020-01-03

Similar Documents

Publication Publication Date Title
EP3723399A1 (en) Identity verification method and apparatus
US20170161721A1 (en) Method and system for opening account based on euicc
TW201706900A (en) Method and device for authentication using dynamic passwords
CN105827600B (en) Method and device for logging in client
WO2015192670A1 (en) User identity authentication method, terminal and service terminal
CN112565213B (en) Authentication method and device, storage medium, and electronic device
CN103636162A (en) Authentication system via two communication devices
CN113099443A (en) Equipment authentication method, device, equipment and system
CN102056077B (en) Method and device for applying smart card by key
US20160381011A1 (en) Network security method and network security system
CN111783068A (en) Device authentication method, system, electronic device and storage medium
CN103839160B (en) A kind of network trading digital signature method and device
CN109815666B (en) Identity authentication method and device based on FIDO protocol, storage medium and electronic equipment
CN101795263A (en) Secure broadband access method, authentication method, device and system
CN109729000B (en) Instant messaging method and device
CN106203021B (en) A kind of more certification modes are integrated to apply login method and system
US11182464B2 (en) Mobile key via mobile device audio channel
CN111031540B (en) Wireless network connection method and computer storage medium
CN105812398A (en) Remote login authorization method and remote login authorization device
JP2016536678A (en) Network management security authentication method, apparatus, system, and computer storage medium
CN110650057B (en) Method and system for configuring equipment through portable mobile terminal
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN111654846A (en) Method and device for acquiring code resource configuration file
CN103312673A (en) Enterprise mobile application system and application method
CN107277935B (en) Bluetooth communication method, device and application system and equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant