CN112866987B - Networking verification method, networking verification device and computer readable storage medium - Google Patents

Networking verification method, networking verification device and computer readable storage medium Download PDF

Info

Publication number
CN112866987B
CN112866987B CN201911090421.7A CN201911090421A CN112866987B CN 112866987 B CN112866987 B CN 112866987B CN 201911090421 A CN201911090421 A CN 201911090421A CN 112866987 B CN112866987 B CN 112866987B
Authority
CN
China
Prior art keywords
identification information
hash value
equipment
equipment identification
networking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911090421.7A
Other languages
Chinese (zh)
Other versions
CN112866987A (en
Inventor
陈小平
熊德林
陈国丞
连根辉
余冬勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Foshan Viomi Electrical Technology Co Ltd
Original Assignee
Foshan Viomi Electrical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Foshan Viomi Electrical Technology Co Ltd filed Critical Foshan Viomi Electrical Technology Co Ltd
Priority to CN201911090421.7A priority Critical patent/CN112866987B/en
Publication of CN112866987A publication Critical patent/CN112866987A/en
Application granted granted Critical
Publication of CN112866987B publication Critical patent/CN112866987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The application provides a networking verification method, networking verification equipment and a computer readable storage medium, wherein the networking verification method comprises the following steps: receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message; acquiring a device identification information ciphertext and a first hash value of the device identification information ciphertext from the networking request message, and calculating a second hash value of the device identification information ciphertext; verifying the equipment identification information ciphertext according to the first hash value and the second hash value; and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, writing the equipment identification information into an equipment white list of a network, and accessing the intelligent household equipment into the network. The application relates to information security, which can improve the security of a home network.

Description

Networking verification method, networking verification device and computer readable storage medium
Technical Field
The present disclosure relates to the field of information security technologies, and in particular, to a networking verification method, a device, and a computer readable storage medium.
Background
At present, home devices are networked by using a wireless Mesh network, in which any wireless device node can serve as a wireless access point (WirelessAccess Point, AP) and a router at the same time, each node in the network can send and receive signals, and each node can directly communicate with one or more peer nodes. However, when the home device is networked through the wireless mesh network, the home device can be accessed to the home network without verification, so that data in the home network is easy to leak, and the security of the home network cannot be ensured. Therefore, how to improve the security of the home network is a problem to be solved at present.
Disclosure of Invention
The main object of the present application is to provide a networking verification method, a device and a computer readable storage medium, which aim to improve the security of a home network.
In a first aspect, the present application provides a networking verification method, where the networking verification method includes the following steps:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring a device identification information ciphertext and a first hash value of the device identification information ciphertext from the networking request message, and calculating a second hash value of the device identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of a network so as to enable the intelligent home equipment to be accessed into the network.
In a second aspect, the present application also provides a computer device comprising a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program when executed by the processor implements the steps of the networking authentication method as described above.
In a third aspect, the present application further provides a computer readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements the steps of a networking authentication method as described above.
The application provides a networking verification method, equipment and a computer readable storage medium, wherein the networking verification method, equipment and the computer readable storage medium are used for obtaining a networking request message by receiving the networking request message sent by intelligent household equipment, decrypting the networking request message, obtaining a first hash value of equipment identification information ciphertext and the equipment identification information ciphertext from the networking request message, calculating a second hash value of the equipment identification information ciphertext, verifying the equipment identification information ciphertext according to the first hash value and the second hash value, decrypting the equipment identification information ciphertext when the intelligent household equipment passes verification, obtaining equipment identification information, writing the equipment identification information into an equipment white list of a network, and accessing the intelligent household equipment into the network. Through double encryption of the equipment identification information, the equipment identification information can be prevented from being tampered, the reliability of the equipment identification information is improved, meanwhile, the equipment identification information is verified, after verification, the intelligent home equipment which sends the equipment identification information is accessed to a network, and the safety of home networking is effectively improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a networking verification method provided in an embodiment of the present application;
fig. 2 is a schematic diagram of a networking encryption process of a networking verification method according to an embodiment of the present application;
fig. 3 is a flow chart of another networking verification method according to an embodiment of the present application;
fig. 4 is a schematic block diagram of a computer device according to an embodiment of the present application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The flow diagrams depicted in the figures are merely illustrative and not necessarily all of the elements and operations/steps are included or performed in the order described. For example, some operations/steps may be further divided, combined, or partially combined, so that the order of actual execution may be changed according to actual situations.
The embodiment of the application provides a networking verification method, computer equipment and a computer readable storage medium. The networking verification method can be applied to networking verification equipment, wherein the networking verification equipment can be mobile phones, tablet computers, notebook computers, desktop computers, personal digital assistants, wearable equipment and the like, can be intelligent household equipment such as televisions, intelligent washing machines and intelligent refrigerators, and can also be servers.
Some embodiments of the present application are described in detail below with reference to the accompanying drawings. The following embodiments and features of the embodiments may be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a flow chart of a networking verification method according to an embodiment of the present application.
As shown in fig. 1, the networking authentication method includes steps S101 to S104.
Step S101, a networking request sent by intelligent home equipment is received, and encrypted equipment identification information ciphertext in the networking request is decrypted to obtain the equipment identification information ciphertext.
The intelligent home equipment acquires equipment identification information from the local storage, encrypts the equipment identification information according to preset key information, and obtains equipment identification information ciphertext; based on a preset hash algorithm, calculating a hash value of the equipment information ciphertext; generating a networking request message based on the equipment identification information ciphertext and the hash value, encrypting the networking request message to obtain an encrypted networking request message, and sending the encrypted networking request message to networking verification equipment.
The encryption mode of the equipment identification information specifically comprises the following steps: performing logic exclusive-or processing on the preset key information and the equipment identification information, and performing cyclic shift processing on the equipment identification information subjected to the logic exclusive-or processing according to a preset cyclic shift strategy to obtain equipment identification information ciphertext. It should be noted that the preset hash algorithm may be set based on practical situations, which is not specifically limited in this application. Alternatively, the hash algorithm includes a SHA-1 algorithm, a SHA-224 algorithm, a SHA-256 algorithm, a SHA-384 algorithm, and a SHA-512 algorithm. The encryption algorithm of the message can be selected as an IPsec algorithm.
Referring to fig. 2, fig. 2 is a schematic diagram of a process of encrypting device identification information in the embodiment of the present application, as shown in fig. 2, the device identification information is encrypted by key information, then the encrypted device identification information is subjected to cyclic shift processing to obtain a device identification information ciphertext, then a hash value of the device identification information ciphertext is calculated, a networking request message including the hash value and the device identification information ciphertext is generated, and finally the networking request message is encrypted.
The device identification information is used for unique intelligent home equipment, preset key information is stored in the intelligent home equipment, the key information is used for encrypting the device identification information to obtain a device identification information ciphertext, or the device identification information ciphertext is used for decrypting the device identification information ciphertext to obtain the device identification information.
The server receives an encrypted networking request message sent by intelligent home equipment, decrypts the encrypted networking request message to obtain the networking request message, namely decrypts the encrypted networking request message through an IPsec algorithm to obtain the networking request message.
Step S102, a first hash value of the equipment identification information ciphertext and the equipment identification information ciphertext is obtained from the networking request message, and a second hash value of the equipment identification information ciphertext is calculated.
After the network connection request message is decrypted, a first hash value of the equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext in the network connection request message are obtained, and a second hash value of the equipment identification information ciphertext is calculated. Specifically, a hash algorithm tag is obtained from the networking request message, a hash algorithm corresponding to the hash algorithm tag is called, and a second hash value of the equipment identification information ciphertext is calculated.
It should be noted that, the hash algorithm tag is used to uniquely identify the hash algorithm, and the hash algorithm tag may be set based on actual situations, which is not specifically limited in this application. Optionally, the preset hash algorithm labels include, but are not limited to, labels corresponding to SHA-1 algorithm, SHA-224 algorithm, SHA-256 algorithm, SHA-384 algorithm and SHA-512 algorithm.
And step 103, verifying the equipment identification information ciphertext according to the first hash value and the second hash value.
Based on the second hash value and the first hash value, it may be determined whether the device identification information ciphertext has been tampered with. Specifically, determining whether the first hash value is the same as the second hash value; if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes the verification, and determining that the equipment identification information ciphertext is not tampered in the transmission process; if the first hash value is different from the second hash value, the equipment identification information ciphertext is determined to be not checked, and the equipment identification information ciphertext is determined to be tampered in the transmission process.
And step S104, when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of a network so as to enable the intelligent household equipment to be accessed into the network.
And when the equipment identification information ciphertext passes the verification, continuing decrypting the equipment identification information ciphertext. Specifically, according to a preset cyclic shift strategy, performing cyclic logic shift processing on the equipment identification information ciphertext; and obtaining preset key information, and performing logic exclusive OR processing on the key information and the equipment identification information ciphertext subjected to cyclic shift processing to obtain the equipment identification information. The shift direction of the preset cyclic shift strategy and the shift direction of the cyclic logic shift strategy in the encryption process are opposite to each other, and the number of bits shifted in the preset cyclic shift strategy can be set by a user.
After the device identification information is obtained, the device identification information is written into a device white list of the network so as to enable the intelligent home device to be accessed into the network. In an embodiment, before writing the device identification information into a device white list of the network, judging whether the device identification information is located in a preset device identification information base, if the device identification information is located in the preset device identification information base, determining that the smart home device passes networking verification, and therefore writing the device identification information into the device white list of the network to enable the smart home device to be accessed into the network; if the equipment identification information is not located in the preset equipment identification information base, determining that the intelligent home equipment fails to pass the networking verification, and outputting preset reminding information to remind a user to reconfigure key information.
In an embodiment, when an intelligent home equipment networking request is received, if equipment identification information generated by two times of decryption is not located in a preset equipment identification information base, the intelligent home equipment does not pass networking verification, and networking verification is needed again for the intelligent home equipment, namely whether the equipment identification information is located in the preset equipment identification information base or not is verified, if the equipment identification information is verified once for each pair of intelligent home equipment, the verification times of the intelligent home equipment are increased by 1, and meanwhile, whether the verification times reach a preset times threshold value is determined; and if the verification times reach a preset times threshold, adding the equipment identification information into an equipment blacklist.
According to the networking verification method provided by the embodiment, the encrypted networking request message sent by the intelligent home equipment is received, the encrypted networking request message is decrypted to obtain the networking request message, the equipment identification information ciphertext and the first hash value of the equipment identification information ciphertext are obtained from the networking request message, the second hash value of the equipment identification information ciphertext is calculated, then the equipment identification information is verified according to the first hash value and the second hash value, and when the equipment identification information ciphertext passes the verification, the equipment identification information ciphertext is decrypted to obtain the equipment identification information, the equipment identification information is written into the equipment white list of the network, and the intelligent home equipment is accessed into the network. Through networking verification, the safety of home networking is effectively improved.
Referring to fig. 3, fig. 3 is a flowchart of another networking verification method according to an embodiment of the present application.
As shown in fig. 3, the networking authentication method includes steps S201 to S208.
Step S201, an encrypted networking request message sent by the intelligent home equipment is received, and the encrypted networking request message is decrypted to obtain the networking request message.
The server receives an encrypted networking request message sent by intelligent home equipment, decrypts the encrypted networking request message to obtain the networking request message, namely decrypts the encrypted networking request message through an IPsec algorithm to obtain the networking request message.
Step S202, a first hash value of the equipment identification information ciphertext and the equipment identification information ciphertext is obtained from the networking request message, and a second hash value of the equipment identification information ciphertext is calculated.
After the network connection request message is decrypted, a first hash value of the equipment identification information ciphertext and a first hash value of the equipment identification information ciphertext in the network connection request message are obtained, and a second hash value of the equipment identification information ciphertext is calculated. Specifically, a hash algorithm tag is obtained from the networking request message, a hash algorithm corresponding to the hash algorithm tag is called, and a second hash value of the equipment identification information ciphertext is calculated.
And step 203, verifying the equipment identification information ciphertext according to the first hash value and the second hash value.
Based on the second hash value and the first hash value, it may be determined whether the device identification information ciphertext has been tampered with. Specifically, determining whether the first hash value is the same as the second hash value; if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes the verification, and determining that message information in the networking request is not tampered in the transmission process; if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification, and determining that message information in the networking request is tampered in the transmission process.
And step S204, decrypting the equipment identification information ciphertext to obtain the equipment identification information when the equipment identification information ciphertext passes the verification.
And when the equipment identification information ciphertext passes the verification, continuing decrypting the equipment identification information ciphertext. Specifically, according to a preset cyclic shift strategy, performing cyclic logic shift processing on the equipment identification information ciphertext; and obtaining preset key information, and performing logic exclusive OR processing on the key information and the equipment identification information ciphertext subjected to cyclic shift processing to obtain the equipment identification information.
Step S205, judging whether the equipment identification information is located in a preset equipment identification information base, and if the equipment identification information is not located in the preset equipment identification information base, outputting preset reminding information to remind a user to reconfigure the key information.
Judging whether the equipment identification information is positioned in a preset equipment identification information base, if the equipment identification information is positioned in the preset equipment identification information base, determining that the intelligent household equipment passes networking verification, and writing the equipment identification information into an equipment white list of the network so as to access the intelligent household equipment into the network; if the equipment identification information is not located in the preset equipment identification information base, determining that the intelligent home equipment fails to pass the networking verification, and outputting preset reminding information to remind a user to reconfigure key information.
Step S206, receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page.
When a reconfiguration instruction of key information is received, an identity verification page is displayed, and a user can input password information through the identity verification page so as to verify the identity of the user, namely, the user receives the password information input by the user based on the verification confirmation page and verifies the input password information. The password information comprises, but is not limited to, digital passwords, sliding gesture information, fingerprint characteristic information and face characteristic information.
And step S207, when the password information passes the verification, displaying a key information configuration page, and acquiring key configuration information input by a user on the key information configuration page.
In the authentication process, the user is required to input password information, and when the password information is correct, a key information configuration page is displayed, and key configuration information input by the user in the key information configuration page is acquired. The key configuration information is composed of numbers, english letters and/or special characters, and the specific composition mode can be set by the user, which is not particularly limited in this application.
Step S208, a pre-stored network identifier is obtained, and the key information is reconfigured according to the network identifier and the key configuration information.
The network identifier is used for uniquely identifying the home network, and is composed of numbers, english letters and/or special characters, and the specific composition mode of the network identifier can be set based on practical situations, which is not specifically limited in this application.
Specifically, according to a preset hash algorithm, a hash value of the network identifier and a hash value of the key configuration information are calculated respectively, the hash value of the network identifier and the hash value of the key configuration information are spliced to obtain a target hash value, and the key information is updated to the target hash value. The hash value of the network identifier and the hash value of the key configuration information may be spliced in such a way that the hash value of the network identifier is preceded and the hash value of the key configuration information is followed, including the hash value of the network identifier is followed and the hash value of the key configuration information is preceded. The above-mentioned hashing algorithm may be set based on actual conditions, which are not particularly limited in this application. Optionally, the pre-set hashing algorithm includes, but is not limited to, a SHA-1 algorithm, a SHA-224 algorithm, a SHA-256 algorithm, a SHA-384 algorithm, a SHA-512 algorithm.
Specifically, when a reading instruction of key information triggered by a user is detected, a user identifier is obtained from the reading instruction, whether the user identifier is located on a preset user white list is determined, and if the user identifier is located on the preset user white list, the key information is displayed. When the user reads the key information, the identity of the user is verified, so that the safety can be improved.
According to the networking verification method provided by the embodiment, the identity authentication page is displayed according to the reconfiguration instruction by receiving the reconfiguration instruction of the key information, the password information input by the user on the identity authentication page is obtained, then when the password information passes verification, the key information configuration page is displayed, the key configuration information input by the user on the key information configuration page is obtained, then the pre-stored network identifier is obtained, and the key information is reconfigured according to the network identifier and the key configuration information. By updating the key information, the efficiency of networking verification is improved, and the safety of networking verification is improved.
Referring to fig. 4, fig. 4 is a schematic block diagram of a computer device according to an embodiment of the present application. The computer device may be a server or a terminal.
As shown in fig. 4, the computer device includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a non-volatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program comprises program instructions that, when executed, cause the processor to perform any of a number of networking authentication methods.
The processor is used to provide computing and control capabilities to support the operation of the entire computer device.
The internal memory provides an environment for the execution of a computer program in a non-volatile storage medium that, when executed by a processor, causes the processor to perform any of a number of networking authentication methods.
The network interface is used for network communication such as transmitting assigned tasks and the like. Those skilled in the art will appreciate that the structures shown in FIG. 4 are block diagrams only and do not constitute a limitation of the computer device on which the present aspects apply, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that the processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-Programmable gate arrays (FPGA) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein in one embodiment the processor is configured to run a computer program stored in the memory to implement the steps of:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring a device identification information ciphertext and a first hash value of the device identification information ciphertext from the networking request message, and calculating a second hash value of the device identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
and when the equipment identification information ciphertext passes the verification, decrypting the equipment identification information ciphertext to obtain equipment identification information, and writing the equipment identification information into an equipment white list of a network so as to enable the intelligent home equipment to be accessed into the network.
In one embodiment, the processor, when implementing the second hash value for computing the ciphertext of the device identification information, is configured to implement:
and acquiring a hash algorithm tag from the networking request message, calling a hash algorithm corresponding to the hash algorithm tag, and calculating a second hash value of the equipment identification information ciphertext.
In one embodiment, when implementing verification of the device identification information ciphertext according to the first hash value and the second hash value, the processor is configured to implement:
determining whether the first hash value is the same as the second hash value;
if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification;
and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification.
In one embodiment, the processor is further configured to, when implementing decrypting the ciphertext of the device identification information to obtain the device identification information, implement:
performing cyclic shift processing on the equipment identification information ciphertext according to a preset cyclic shift strategy;
and obtaining preset key information, and performing logic exclusive OR processing on the key information and the equipment identification information ciphertext subjected to cyclic shift processing to obtain the equipment identification information.
In one embodiment, the processor is configured, before implementing writing the device identification information into a device whitelist of a network to access the smart home device to the network, to implement:
judging whether the equipment identification information is positioned in a preset equipment identification information base or not;
if the equipment identification information is positioned in a preset equipment identification information base, writing the equipment identification information into an equipment white list of a network so as to enable the intelligent home equipment to be accessed into the network;
and if the equipment identification information is not positioned in the preset equipment identification information base, outputting preset reminding information to remind the user to reconfigure the key information.
In one embodiment, the processor is further configured to, after implementing outputting preset alert information to alert a user to reconfigure the key information, implement:
receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page;
when the password information passes the verification, a key information configuration page is displayed, and key configuration information input by a user on the key information configuration page is obtained;
and acquiring a pre-stored network identifier, and reconfiguring the key information according to the network identifier and the key configuration information.
In one embodiment, the processor, when implementing the reconfiguration of the key information according to the network identifier and key configuration information, is configured to implement:
according to a preset hash algorithm, respectively calculating a hash value of the network identifier and a hash value of the key configuration information;
and splicing the hash value of the network identifier and the hash value of the key configuration information to obtain a target hash value, and updating the key information into the target hash value.
In one embodiment, when implementing the networking verification method, the processor is further configured to implement:
when a reading instruction of key information triggered by a user is detected, acquiring a user identifier from the reading instruction, and determining whether the user identifier is positioned on a preset user white list;
and if the user identifier is positioned in a preset user white list, displaying the key information.
Embodiments of the present application also provide a computer readable storage medium, where a computer program is stored, where the computer program includes program instructions, and a method implemented when the program instructions are executed may refer to various embodiments of the networking verification method of the present application.
The computer readable storage medium may be an internal storage unit of the computer device according to the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, which are provided on the computer device.
It is to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments. While the invention has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (8)

1. A networking verification method, comprising:
receiving an encrypted networking request message sent by intelligent home equipment, and decrypting the encrypted networking request message to obtain the networking request message;
acquiring a first hash value of a device identification information ciphertext and the device identification information ciphertext from the networking request message, acquiring a hash algorithm tag from the networking request message, calling a hash algorithm corresponding to the hash algorithm tag, and calculating a second hash value of the device identification information ciphertext;
verifying the equipment identification information ciphertext according to the first hash value and the second hash value;
when the equipment identification information ciphertext passes the verification, performing cyclic shift processing on the equipment identification information ciphertext according to a preset cyclic shift strategy;
obtaining preset key information, performing logic exclusive OR processing on the key information and the equipment identification information ciphertext subjected to cyclic shift processing to obtain equipment identification information, and writing the equipment identification information into an equipment white list of a network so as to enable the intelligent household equipment to be accessed into the network.
2. The networking authentication method of claim 1, wherein the verifying the device identification information ciphertext based on the first hash value and the second hash value comprises:
determining whether the first hash value is the same as the second hash value;
if the first hash value is the same as the second hash value, determining that the equipment identification information ciphertext passes verification;
and if the first hash value is different from the second hash value, determining that the equipment identification information ciphertext does not pass the verification.
3. The networking authentication method of claim 2, wherein before writing the device identification information into a device whitelist of a network to access the smart home device to the network, further comprising:
judging whether the equipment identification information is positioned in a preset equipment identification information base or not;
if the equipment identification information is positioned in a preset equipment identification information base, writing the equipment identification information into an equipment white list of a network so as to enable the intelligent home equipment to be accessed into the network;
and if the equipment identification information is not positioned in the preset equipment identification information base, outputting preset reminding information to remind the user to reconfigure the key information.
4. The networking verification method of claim 3, wherein the outputting of the preset reminding information to remind the user to reconfigure the key information further comprises;
receiving a reconfiguration instruction of the key information, displaying an identity authentication page according to the reconfiguration instruction, and acquiring password information input by a user on the identity authentication page;
when the password information passes the verification, a key information configuration page is displayed, and key configuration information input by a user on the key information configuration page is obtained;
and acquiring a pre-stored network identifier, and reconfiguring the key information according to the network identifier and the key configuration information.
5. The networking authentication method of claim 4, wherein the reconfiguring the key information according to the network identifier and key configuration information comprises:
according to a preset hash algorithm, respectively calculating a hash value of the network identifier and a hash value of the key configuration information;
and splicing the hash value of the network identifier and the hash value of the key configuration information to obtain a target hash value, and updating the key information into the target hash value.
6. The networking authentication method of any one of claims 1 to 2, further comprising:
when a reading instruction of key information triggered by a user is detected, acquiring a user identifier from the reading instruction, and determining whether the user identifier is positioned on a preset user white list;
and if the user identifier is positioned in a preset user white list, displaying the key information.
7. A computer device comprising a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program when executed by the processor implements the steps of the networking authentication method according to any of claims 1 to 6.
8. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the networking authentication method according to any of claims 1 to 6.
CN201911090421.7A 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium Active CN112866987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911090421.7A CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911090421.7A CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112866987A CN112866987A (en) 2021-05-28
CN112866987B true CN112866987B (en) 2023-08-04

Family

ID=75984115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911090421.7A Active CN112866987B (en) 2019-11-08 2019-11-08 Networking verification method, networking verification device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112866987B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
CN106301759A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of method of data encryption, the method and device of deciphering
CN108183899A (en) * 2017-12-28 2018-06-19 北京明朝万达科技股份有限公司 A kind of data safety management system and method
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN109688583A (en) * 2018-12-03 2019-04-26 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A kind of data ciphering method in star earth communication system
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719250A (en) * 2009-12-10 2010-06-02 中国联合网络通信集团有限公司 Payment authentication method, platform and system
CN106301759A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of method of data encryption, the method and device of deciphering
CN108183899A (en) * 2017-12-28 2018-06-19 北京明朝万达科技股份有限公司 A kind of data safety management system and method
CN109688583A (en) * 2018-12-03 2019-04-26 武汉船舶通信研究所(中国船舶重工集团公司第七二二研究所) A kind of data ciphering method in star earth communication system
CN109660609A (en) * 2018-12-07 2019-04-19 北京海泰方圆科技股份有限公司 A kind of device identification method and device and storage medium
CN110061849A (en) * 2019-04-29 2019-07-26 中兴新能源汽车有限责任公司 Verification method, server, mobile unit and the storage medium of mobile unit

Also Published As

Publication number Publication date
CN112866987A (en) 2021-05-28

Similar Documents

Publication Publication Date Title
US10666642B2 (en) System and method for service assisted mobile pairing of password-less computer login
US9635014B2 (en) Method and apparatus for authenticating client credentials
US20190280883A1 (en) Key-Attestation-Contingent Certificate Issuance
US11025437B2 (en) Post-manufacture certificate generation
WO2019218919A1 (en) Private key management method and apparatus in blockchain scenario, and system
US20170208049A1 (en) Key agreement method and device for verification information
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
JP2016520265A (en) Generation of working security keys based on security parameters
EP3511853B1 (en) Security authentication method, integrated circuit and system
CN107194237B (en) Method and device for application program security authentication, computer equipment and storage medium
CN105281904A (en) Message data encryption method and system, internet of things server and internet of things terminal
US10621335B2 (en) Method and device for verifying security of application
US20170353315A1 (en) Secure electronic entity, electronic apparatus and method for verifying the integrity of data stored in such a secure electronic entity
CN110326266A (en) A kind of method and device of data processing
CN108777691B (en) Network security protection method and device
US9367700B2 (en) System and method for establishing a shared secret for communication between different security domains
CN107548542B (en) User authentication method with enhanced integrity and security
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
JP6888122B2 (en) Semiconductor device, update data provision method, update data reception method and program
JP2015104020A (en) Communication terminal device, communication terminal association system, communication terminal association method and computer program
CN113127844A (en) Variable access method, device, system, equipment and medium
CN107135074B (en) Advanced security method and device
CN109302442B (en) Data storage proving method and related equipment
CN112866987B (en) Networking verification method, networking verification device and computer readable storage medium
US11776340B2 (en) Electronic device authentication method, and apparatus according thereto

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant