CN113556400B - Login method and login device of Internet of things platform and Internet of things system - Google Patents

Login method and login device of Internet of things platform and Internet of things system Download PDF

Info

Publication number
CN113556400B
CN113556400B CN202110827601.XA CN202110827601A CN113556400B CN 113556400 B CN113556400 B CN 113556400B CN 202110827601 A CN202110827601 A CN 202110827601A CN 113556400 B CN113556400 B CN 113556400B
Authority
CN
China
Prior art keywords
login
internet
information
things
risk level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110827601.XA
Other languages
Chinese (zh)
Other versions
CN113556400A (en
Inventor
尚玉红
时培宇
陈君新
赵伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Huacheng Software Technology Co Ltd
Original Assignee
Hangzhou Huacheng Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Huacheng Software Technology Co Ltd filed Critical Hangzhou Huacheng Software Technology Co Ltd
Priority to CN202110827601.XA priority Critical patent/CN113556400B/en
Publication of CN113556400A publication Critical patent/CN113556400A/en
Application granted granted Critical
Publication of CN113556400B publication Critical patent/CN113556400B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a login method, a login device and an Internet of things system of an Internet of things platform, wherein the Internet of things platform is used for storing an ID of Internet of things equipment and corresponding first user account information, and the login method comprises the following steps: receiving a login request sent by a client, wherein the login request at least comprises second user account information; under the condition that the second user account information is matched with the ID of the Internet of things equipment, determining a login risk level according to a login request; generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and judging whether the login request is passed or not according to the operation on the Internet of things equipment. The login method solves the problem of low security of internet of things login in the prior art.

Description

Login method and login device of Internet of things platform and Internet of things system
Technical Field
The application relates to the field of Internet of things, in particular to a login method and login device of an Internet of things platform, a computer readable storage medium, a processor and an Internet of things system.
Background
With the rapid development of the internet of things technology, intelligent home and intelligent equipment become an indispensable part of life of people and are popularized to thousands of households. People manage the intelligent devices in a client form such as APP, PC, web, often register an account number on an internet of things cloud platform by using a mobile phone number or a mailbox, and finish account login by using a password or a short message verification code.
Under normal conditions, people log in the client through the password or the short message verification code, but forget the password and the user changes the mobile phone number, if the mobile phone is stolen or the password is leaked, the traditional login mode becomes extremely unsafe, and at the moment, people need a safer and more convenient password-free login mode.
The above information disclosed in the background section is only for enhancement of understanding of the background art from the technology described herein and, therefore, may contain some information that does not form the prior art that is already known in the country to a person of ordinary skill in the art.
Disclosure of Invention
The application mainly aims to provide a login method, a login device, a computer readable storage medium, a processor and an internet of things system for an internet of things platform, so as to solve the problem of low security of internet of things login in the prior art.
According to an aspect of an embodiment of the present invention, there is provided a login method of an internet of things platform, where the internet of things platform is configured to store an ID of an internet of things device and corresponding first user account information, and the method includes: receiving a login request sent by a client, wherein the login request at least comprises second user account information; determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment; generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and judging whether the login request is passed or not according to the operation acted on the Internet of things equipment.
Optionally, before determining the login risk level according to the login request, if the second user account information matches with the ID of the internet of things device, the method further includes: under the condition that the second user account information is consistent with the first user account information, determining that the second user account information is matched with the ID of the corresponding Internet of things equipment; and under the condition that the second user account information is inconsistent with the first user account information, judging that the login request is not passed.
Optionally, determining whether to pass the login request according to an operation acting on the internet of things device includes: sending the operation prompt to the client; receiving an execution result of the operation prompt; verifying the execution result to obtain a verification result; and judging whether the login request is passed or not according to the verification result.
Optionally, the login request further includes login time information and client characteristic information, the client characteristic information includes client information, an IP address and login area information, the internet of things platform is further configured to store a client information table, an IP address information table, a login area information table and predetermined time period information, the client information table includes client information of historical login of the internet of things platform, the IP address information table includes information of an IP address of the historical login of the internet of things platform, the login area information table includes information of a historical login area of the internet of things platform, and determining a login risk level according to the login request includes: determining whether an abnormal state exists, the abnormal state being one of: the user account corresponding to the second user account information is in a login state, the client information table does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not in a preset time period corresponding to the preset time period information; determining that the login risk level is a low login risk level when no abnormal state exists; determining that the login risk level is a medium login risk level under the condition that one or two abnormal states exist; and determining that the login risk level is a high login risk level when the abnormal states are greater than or equal to three abnormal states.
Optionally, the internet of things device is an intelligent door lock, generates the operation prompt according to the login risk level, and sends the operation prompt to the client, including: when the login risk level is the low login risk level, the generated operation prompt is that door opening operation and door closing operation are completed within a first preset time; when the login risk level is the medium login risk level, the generated operation prompt is that the door opening operation, the dynamic password input and the door closing operation are completed within a second preset time; and under the condition that the login risk level is the high login risk level, the generated operation prompt is that the door opening operation, the dynamic password input, the door closing operation and the restarting operation are completed within a third preset time, wherein the first preset time is longer than the second preset time, and the second preset time is longer than the third preset time.
Optionally, before determining whether to pass the login request according to an operation acting on the internet of things device, the method further includes: and under the condition that the login risk level is the medium login risk level, executing any one of the following authentication operations: the verification result is obtained through double-factor authentication, biological feature authentication and man-machine interaction authentication; and executing at least one of the following authentication operations under the condition that the login risk level is the high login risk level: and obtaining the verification result through double-factor authentication, biological characteristic authentication and man-machine interaction authentication.
Optionally, the execution result includes operation time and operation completion information, and the verifying the execution result, to obtain a verification result, includes: if the operation time is longer than a preset time or the operation completion information is NO, the verification result is that the operation is not passed, and the operation completion information is that the operation corresponding to the operation prompt is not completed; and when the operation time is less than or equal to the preset time and the operation completion information is yes, the verification result is that the operation is passed, and the operation completion information is that all the operations corresponding to the operation prompt are completed.
Optionally, determining whether to pass the login request according to the verification result includes: if the verification result is not passed, the login request is not passed; and if the verification result is passed, passing the login request.
According to another aspect of the embodiment of the present invention, there is also provided a login method of an internet of things platform, where the internet of things platform is configured to store an ID of an internet of things device and corresponding first user account information, and the method includes: receiving input second user account information, and generating a login request, wherein the login request at least comprises the second user account information; sending the login request to the Internet of things platform; binding information fed back by the internet of things platform is received, wherein the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not; receiving an operation prompt sent by the internet of things platform under the condition that the second user account information is matched with the ID of the internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to login risk levels, the login risk levels are determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk levels one by one; receiving a verification result, wherein the verification result is determined by the internet of things platform according to the operation acting on the internet of things equipment; and determining whether the login is successful according to the verification result.
According to still another aspect of the embodiment of the present invention, there is further provided a login device of an internet of things platform, where the internet of things platform is configured to store an ID of an internet of things device and corresponding first user account information, and the device includes: the first receiving unit is used for receiving a login request sent by the client, wherein the login request at least comprises second user account information; the first determining unit is used for determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment; the generating unit is used for generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and the second determining unit is used for determining whether the login request is passed or not according to the operation acted on the Internet of things equipment.
According to still another aspect of the embodiment of the present invention, there is further provided a login device of an internet of things platform, where the internet of things platform is configured to store an ID of an internet of things device and corresponding first user account information, and the device includes: the second receiving unit is used for receiving input second user account information and generating a login request, wherein the login request at least comprises the second user account information; the sending unit is used for sending the login request to the Internet of things platform; the third receiving unit is used for receiving binding information fed back by the internet of things platform, and the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not; a fourth receiving unit, configured to receive an operation prompt sent by the internet of things platform when the second user account information is matched with the ID of the internet of things device, where the operation prompt is used to instruct a user to perform a corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one to one; the sixth receiving unit is used for receiving a verification result, wherein the verification result is determined by the internet of things platform according to the operation acting on the internet of things equipment; and the third determining unit is used for determining whether the login is successful according to the verification result.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium including a stored program, wherein the program performs any one of the methods.
According to yet another aspect of the embodiments of the present invention, there is further provided a processor, where the processor is configured to execute a program, where the program executes any one of the methods.
According to still another aspect of the embodiment of the present invention, there is further provided an internet of things system, including an internet of things platform, an internet of things device, and a login apparatus of the internet of things platform, where the login apparatus of the internet of things platform is configured to execute any one of the methods.
In the login method of the internet of things platform, firstly, a login request sent by a client is received, wherein the login request at least comprises second user account information; then, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment; then, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and finally, judging whether the login request is passed or not according to the operation acted on the Internet of things equipment. According to the login method, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not passed through when the operation is completed, and compared with the password or short message verification code login in the prior art, the risk of mobile phone theft or password leakage is avoided by the login method, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 shows a flow chart of a login method for an Internet of things platform according to one embodiment of the application;
FIG. 2 is a flow chart illustrating a method of logging in an Internet of things platform according to another embodiment of the application;
FIG. 3 shows a schematic diagram of a login device of an Internet of things platform according to one embodiment of the application;
FIG. 4 shows a schematic diagram of a login device of an Internet of things platform according to another embodiment of the application;
FIG. 5 shows a schematic diagram of an Internet of things system according to one embodiment of the application;
fig. 6 shows a business flow diagram of an internet of things system according to an embodiment of the application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the application herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As described in the background art, in order to solve the above problem, in an exemplary embodiment of the present application, a login method, a login device, a computer readable storage medium, a processor and an internet of things system for an internet of things platform are provided.
According to the embodiment of the application, a login method of an internet of things platform is provided, wherein the internet of things platform is used for storing an ID of internet of things equipment and corresponding first user account information.
Fig. 1 is a flowchart of a login method of an internet of things platform according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
step S101, receiving a login request sent by a client, wherein the login request at least comprises second user account information;
step S102, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment;
step S103, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one;
step S104, according to the operation on the Internet of things equipment, judging whether the login request is passed.
In the login method of the internet of things platform, firstly, a login request sent by a client is received, wherein the login request at least comprises second user account information; then, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment; then, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and finally, judging whether the login request is passed or not according to the operation acted on the Internet of things equipment. According to the login method, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not passed through when the operation is completed, and compared with the password or short message verification code login in the prior art, the risk of mobile phone theft or password leakage is avoided by the login method, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
In an embodiment of the present application, before determining the login risk level according to the login request, if the second user account information matches with the ID of the internet of things device, the method further includes: under the condition that the second user account information is consistent with the first user account information, determining that the second user account information is matched with the ID of the corresponding Internet of things equipment; and when the second user account information is inconsistent with the first user account information, judging that the login request is not passed. Specifically, if the second user account information is consistent with the stored first user account information, it may be determined that the second user account information is matched with the corresponding ID of the internet of things device, that is, the user account is bound with the internet of things device, and if the second user account information is inconsistent with the stored first user account information, that is, the user account is not bound with the internet of things device, the identity of the user cannot be verified through the designated operation on the internet of things device, and the login request is directly not passed.
In one embodiment of the present application, determining whether to pass the login request according to an operation acting on the internet of things device includes: sending the operation prompt to the client; receiving an execution result of the operation prompt; verifying the execution result to obtain a verification result; and judging whether the login request is passed or not according to the verification result. Specifically, the operation prompt is sent to the client to instruct the operation corresponding to the internet of things device, then an execution result of the operation prompt fed back by the internet of things device is received, the execution result can be obtained according to information analysis fed back by the internet of things device, whether the execution result meets requirements or not is verified, and a verification result is obtained, so that whether the login request is passed or not is judged, namely, when the execution results meet the corresponding requirements, the login request is passed, and otherwise, the login request is not passed, so that the login security is further improved.
In one embodiment of the present application, the login request further includes login time information and client feature information, the client feature information includes client information, an IP address, and login area information, the internet of things platform is further configured to store a client information table, an IP address information table, a login area information table, and predetermined time period information, the client information table includes client information of historical login of the internet of things platform, the IP address information table includes information of an IP address of historical login of the internet of things platform, the login area information table includes information of a historical login area of the internet of things platform, and determining a login risk level according to the login request includes: determining whether an abnormal state exists, wherein the abnormal state is one of the following: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a predetermined time period corresponding to the predetermined time period information; determining that the login risk level is a low login risk level when no abnormal state exists; determining the login risk level as a medium login risk level when one or two abnormal states exist; and when the abnormal states are greater than or equal to three, determining that the login risk level is a high login risk level. Specifically, there are 5 abnormal states, that is, the user account is in a login state, a different device login, a different IP login, a different login, and an abnormal period login, and the login risk level can be determined according to the number of the existing abnormal states, that is, when there is no abnormal state, the login risk level is a low login risk level, when there are one or two of the abnormal states, the login risk level is a medium login risk level, and when there are three or more abnormal states, the login risk level is a high login risk level.
In an embodiment of the present application, the internet of things device is an intelligent door lock, generates an operation prompt according to the login risk level, and sends the operation prompt to the client, including: when the login risk level is the low login risk level, the generated operation prompt is that door opening operation and door closing operation are completed within a first preset time; when the login risk level is the medium login risk level, the generated operation prompt is that the door opening operation, the dynamic password input and the door closing operation are completed within a second preset time; and when the login risk level is the high login risk level, the generated operation prompt is that the door opening operation, the dynamic password input, the door closing operation and the restarting operation are completed within a third preset time, wherein the first preset time is longer than the second preset time, and the second preset time is longer than the third preset time. Specifically, as the login risk level is increased, the operation complexity and the completion time limit corresponding to the generated operation prompt are also gradually increased, so as to reduce the risk of cracking the verification means, thereby further improving the login security, in addition, the first preset time, the second preset time and the third preset time may be selected according to the actual situation, the number of bits of the dynamic password may also be selected according to the actual situation, for example, the first preset time is 30min, the second preset time is 20min, the first preset time is 10min, and the dynamic password may be a 4-bit password or a 6-bit password.
In one embodiment of the present application, before determining whether to pass the login request according to an operation acting on the internet of things device, the method further includes: and executing any one of the following authentication operations when the login risk level is the medium login risk level: the two-factor authentication, the biological characteristic authentication and the man-machine interaction authentication are carried out to obtain the verification result; and executing at least one of the following authentication operations when the login risk level is the high login risk level: and (5) performing double-factor authentication, biological feature authentication and man-machine interaction authentication to obtain the verification result. Specifically, the login risk level is the medium login risk level or the high login risk level, the login verification is performed on the operation of the internet of things device, the login risk is high, for example, a double-factor authentication mode can be added, the double-factor authentication comprises login password verification and operation verification of the internet of things device, and biological feature authentication or man-machine interaction authentication can be added, wherein the medium login risk level is achieved through secondary authentication by adopting one of the three authentication modes, and the high login risk level is achieved through secondary authentication by adopting at least one of the three authentication modes, so that the login safety is further improved.
In one embodiment of the present application, the executing result includes operation time and operation completion information, and the verifying the executing result to obtain a verification result includes: if the operation time is longer than a predetermined time or if the operation completion information is no, the verification result is that the operation is not passed, and if the operation completion information is no, it is indicated that at least one operation corresponding to the operation prompt is not completed; and if the operation time is less than or equal to the predetermined time and the operation completion information is yes, the verification result is that the operation is passed, and the operation completion information is that all the operations corresponding to the operation prompt are completed. Specifically, when the operation time is less than or equal to the predetermined time and the operation completion information is yes, that is, all operations are completed within the predetermined time, the verification result is passed, otherwise, the verification result is not passed, for example, the operation prompt is that the door opening operation, the dynamic password input, the door closing operation and the restarting operation are completed within a third predetermined time, the third predetermined time is 10min, a certain intelligent door lock is required to be operated within 10min, the door is opened first, then the 4-bit dynamic password is input, then the door is closed, finally the door lock is restarted, and the verification is passed, more specifically, the 4-bit dynamic password has 5 opportunities, and is continuously wrong for 5 times, the password is invalid, and the password is invalid after timeout.
In one embodiment of the present application, determining whether to pass the login request according to the verification result includes: if the verification result is not passed, the login request is not passed; and if the verification result is passed, passing the login request. Specifically, if the verification result is that the verification result is passed, the user can access the internet of things platform through the login request, otherwise, the internet of things information leakage is avoided, and the login safety is improved.
The embodiment of the application also provides a login method of the internet of things platform, wherein the internet of things platform is used for storing the ID of the internet of things equipment and the corresponding first user account information, as shown in fig. 2, and the method comprises the following steps:
step S201, receiving input second user account information and generating a login request, wherein the login request at least comprises the second user account information;
step S202, the login request is sent to the Internet of things platform;
step S203, receiving binding information fed back by the Internet of things platform, wherein the binding information is used for representing whether the second user account information is matched with the ID of the Internet of things equipment;
Step S204, receiving an operation prompt sent by the Internet of things platform when the second user account information is matched with the ID of the Internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the Internet of things device, the operation prompt is generated by the Internet of things platform according to a login risk level, the login risk level is determined by the Internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one;
step S205, receiving a verification result, wherein the verification result is determined by the Internet of things platform according to the operation acting on the Internet of things equipment;
step S206, determining whether the login is successful according to the verification result.
In the login method of the internet of things platform, firstly, input second user account information is received, and a login request is generated, wherein the login request at least comprises the second user account information; then, sending the login request to the Internet of things platform; then, binding information fed back by the Internet of things platform is received, wherein the binding information is used for representing whether the second user account information is matched with the ID of the Internet of things device or not; then, receiving an operation prompt sent by the internet of things platform under the condition that the second user account information is matched with the ID of the internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to login risk levels, the login risk levels are determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk levels one by one; and then receiving a verification result, wherein the verification result is determined by the Internet of things platform according to the operation on the Internet of things equipment, and finally determining whether the login is successful according to the verification result. According to the login method, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that according to the operation on the Internet of things equipment, a verification result is determined, whether the login is successful or not is determined, namely, the login is successful if the operation is completed, and the login fails if the operation is not completed.
The embodiment of the application also provides a login device of the internet of things platform, which is used for storing the ID of the internet of things equipment and the corresponding first user account information. The login device of the internet of things platform provided by the embodiment of the application is introduced as follows.
Fig. 3 is a schematic diagram of a login device of an internet of things platform according to an embodiment of the application. As shown in fig. 3, the apparatus includes:
a first receiving unit 10, configured to receive a login request sent by a client, where the login request includes at least second user account information;
a first determining unit 20, configured to determine a login risk level according to the login request when the second user account information matches with the ID of the internet of things device;
a generating unit 30, configured to generate an operation prompt according to the login risk level and send the operation prompt to the client, where the operation prompt is used to instruct to perform a corresponding operation on the internet of things device, and the operation prompt corresponds to the login risk level one by one;
A second determining unit 40, configured to determine whether to pass the login request according to an operation performed on the internet of things device.
In the login device of the internet of things platform, a first receiving unit receives a login request sent by a client, wherein the login request at least comprises second user account information; the first determining unit determines a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things device; the generation unit generates an operation prompt according to the login risk level and sends the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; the second determination unit determines whether the login request is passed or not according to an operation acting on the internet of things device. The login device determines the login risk level according to the login request and generates an operation prompt according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not performed through the login request if the operation is not completed, and compared with the password or short message verification code login in the prior art, the login method avoids the risk of mobile phone theft or password leakage, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
In an embodiment of the present application, before determining the login risk level according to the login request, if the second user account information matches with the ID of the internet of things device, the method further includes: under the condition that the second user account information is consistent with the first user account information, determining that the second user account information is matched with the ID of the corresponding Internet of things equipment; and when the second user account information is inconsistent with the first user account information, judging that the login request is not passed. Specifically, if the second user account information is consistent with the stored first user account information, it may be determined that the second user account information is matched with the corresponding ID of the internet of things device, that is, the user account is bound with the internet of things device, and if the second user account information is inconsistent with the stored first user account information, that is, the user account is not bound with the internet of things device, the identity of the user cannot be verified through the designated operation on the internet of things device, and the login request is directly not passed.
In one embodiment of the present application, the second determining unit includes a first sending module, a first receiving module, a verification module, and a first determining module, where the first sending module is configured to send the operation prompt to the client; the first receiving module is used for receiving an execution result of the operation prompt; the verification module is used for verifying the execution result to obtain a verification result; the first determining module is configured to determine whether to pass the login request according to the verification result. Specifically, the operation prompt is sent to the client to instruct the operation corresponding to the internet of things device, then an execution result of the operation prompt fed back by the internet of things device is received, the execution result can be obtained according to information analysis fed back by the internet of things device, whether the execution result meets requirements or not is verified, and a verification result is obtained, so that whether the login request is passed or not is judged, namely, when the execution results meet the corresponding requirements, the login request is passed, and otherwise, the login request is not passed, so that the login security is further improved.
In one embodiment of the present application, the login request further includes login time information and client feature information, the client feature information includes client information, an IP address, and login area information, the internet of things platform is further configured to store a client information table, an IP address information table, a login area information table, and predetermined time period information, the client information table includes client information of historical login of the internet of things platform, the IP address information table includes information of an IP address of historical login of the internet of things platform, the login area information table includes information of a historical login area of the internet of things platform, the first determining unit includes a second determining module, a third determining module, a fourth determining module, and a fifth determining module, where the second determining module is configured to determine whether an abnormal state exists, and the abnormal state is one of: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a predetermined time period corresponding to the predetermined time period information; the third determining module is configured to determine that the login risk level is a low login risk level when no abnormal state exists; the fourth determining module is configured to determine that the login risk level is a medium login risk level when one or two of the abnormal states exist; the fifth determining module is configured to determine that the login risk level is a high login risk level when there are three or more abnormal states. Specifically, there are 5 abnormal states, that is, the user account is in a login state, a different device login, a different IP login, a different login, and an abnormal period login, and the login risk level can be determined according to the number of the existing abnormal states, that is, when there is no abnormal state, the login risk level is a low login risk level, when there are one or two of the abnormal states, the login risk level is a medium login risk level, and when there are three or more abnormal states, the login risk level is a high login risk level.
In an embodiment of the present application, the internet of things device is an intelligent door lock, and the generating unit includes a first generating module, a second generating module, and a third generating module, where the first generating module is configured to complete a door opening operation and a door closing operation within a first predetermined time when the login risk level is the low login risk level; the second generating module is configured to generate the operation prompt to complete the door opening operation, the dynamic password input, and the door closing operation within a second predetermined time when the login risk level is the medium login risk level; the third generation module is configured to generate the operation prompt to complete the door opening operation, the dynamic password input, the door closing operation, and the restarting operation within a third predetermined time when the login risk level is the high login risk level, where the first predetermined time is greater than the second predetermined time, and the second predetermined time is greater than the third predetermined time. Specifically, as the login risk level is increased, the operation complexity and the completion time limit corresponding to the generated operation prompt are also gradually increased, so as to reduce the risk of cracking the verification means, thereby further improving the login security, in addition, the first preset time, the second preset time and the third preset time may be selected according to the actual situation, the number of bits of the dynamic password may also be selected according to the actual situation, for example, the first preset time is 30min, the second preset time is 20min, the first preset time is 10min, and the dynamic password may be a 4-bit password or a 6-bit password.
In an embodiment of the present application, the apparatus further includes a processing unit, where the processing unit is configured to perform, before determining whether to pass the login request according to an operation performed on the internet of things device, any one of the following authentication operations when the login risk level is the medium login risk level: the two-factor authentication, the biological characteristic authentication and the man-machine interaction authentication are carried out to obtain the verification result; and executing at least one of the following authentication operations when the login risk level is the high login risk level: and (5) performing double-factor authentication, biological feature authentication and man-machine interaction authentication to obtain the verification result. Specifically, the login risk level is the medium login risk level or the high login risk level, the login verification is performed on the operation of the internet of things device, the login risk is high, for example, a double-factor authentication mode can be added, the double-factor authentication comprises login password verification and operation verification of the internet of things device, and biological feature authentication or man-machine interaction authentication can be added, wherein the medium login risk level is achieved through secondary authentication by adopting one of the three authentication modes, and the high login risk level is achieved through secondary authentication by adopting at least one of the three authentication modes, so that the login safety is further improved.
In one embodiment of the present application, the execution result includes an operation time and operation completion information, and the verification module includes a first verification sub-module and a second verification sub-module, where the first verification sub-module is configured to, when the operation time is greater than a predetermined time or the operation completion information is no, determine that the operation is not passed, and determine whether the operation completion information indicates that at least one operation corresponding to the operation prompt is not completed; the second verification submodule is configured to, when the operation time is less than or equal to the predetermined time and the operation completion information is yes, pass the verification result, and the operation completion information is yes, indicating that all the operations corresponding to the operation prompt are completed. Specifically, when the operation time is less than or equal to the predetermined time and the operation completion information is yes, that is, all operations are completed within the predetermined time, the verification result is passed, otherwise, the verification result is not passed, for example, the operation prompt is that the door opening operation, the dynamic password input, the door closing operation and the restarting operation are completed within a third predetermined time, the third predetermined time is 10min, a certain intelligent door lock is required to be operated within 10min, the door is opened first, then the 4-bit dynamic password is input, then the door is closed, finally the door lock is restarted, and the verification is passed, more specifically, the 4-bit dynamic password has 5 opportunities, and is continuously wrong for 5 times, the password is invalid, and the password is invalid after timeout.
In one embodiment of the present application, the first determining module includes a first determining submodule and a second determining submodule, where the first determining submodule is configured to fail the login request if the verification result is fail; the second determining submodule is used for passing the login request when the verification result is passed. Specifically, if the verification result is that the verification result is passed, the user can access the internet of things platform through the login request, otherwise, the internet of things information leakage is avoided, and the login safety is improved.
The embodiment of the application also provides a login device of the internet of things platform, which is used for storing the ID of the internet of things equipment and the corresponding first user account information. The login device of the internet of things platform provided by the embodiment of the application is introduced as follows.
Fig. 4 is a schematic diagram of a login device of an internet of things platform according to an embodiment of the application. As shown in fig. 4, the apparatus includes:
A second receiving unit 100, configured to receive input second user account information, and generate a login request, where the login request at least includes the second user account information;
a sending unit 200, configured to send the login request to the internet of things platform;
the third receiving unit 300 is configured to receive binding information fed back by the internet of things platform, where the binding information is used to characterize whether the second user account information is matched with the ID of the internet of things device;
a fourth receiving unit 400, configured to receive an operation prompt sent by the internet of things platform when the second user account information matches with the ID of the internet of things device, where the operation prompt is used to instruct a user to perform a corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one;
a sixth receiving unit 500, configured to receive a verification result, where the verification result is determined by the internet of things platform according to an operation acting on the internet of things device;
And a third determining unit 600, configured to determine whether the login is successful according to the verification result.
In the login device of the internet of things platform, a second receiving unit receives input second user account information and generates a login request, wherein the login request at least comprises the second user account information; the sending unit sends the login request to the Internet of things platform; a third receiving unit receives binding information fed back by the internet of things platform, wherein the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not; a fourth receiving unit receives an operation prompt sent by the internet of things platform when the second user account information is matched with the ID of the internet of things device, where the operation prompt is used to instruct a user to perform a corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one; the sixth receiving unit receives a verification result, the verification result is determined by the internet of things platform according to the operation acting on the internet of things device, and the third determining unit determines whether login is successful according to the verification result. The login device determines the login risk level according to the login request and generates an operation prompt according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that according to the operation on the Internet of things equipment, a verification result is determined, whether the login is successful or not is determined, namely, the login is successful if the operation is completed, and the login fails if the operation is not completed.
The embodiment of the application also provides an Internet of things system, which comprises an Internet of things platform, internet of things equipment and a login device of the Internet of things platform, wherein the login device of the Internet of things platform is used for executing any one of the methods.
In the above-mentioned internet of things system, including the internet of things platform, internet of things equipment and login device of the internet of things platform, the first receiving unit receives the login request sent by the customer end, the above-mentioned login request includes the information of the second user account at least; the first determining unit determines a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things device; the generation unit generates an operation prompt according to the login risk level and sends the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; the second determination unit determines whether the login request is passed or not according to an operation acting on the internet of things device. According to the Internet of things system, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not performed through the operation, and compared with the password or short message verification code login in the prior art, the login method avoids the risk of mobile phone theft or password leakage, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
It should be noted that, as shown in fig. 5, the platform of the internet of things includes a user service subsystem, a device management subsystem, a binding relationship management subsystem, a risk automatic judging subsystem and a device behavior verification subsystem, where the user service subsystem is used for providing a user operation function for a user, the user interacts with the user service subsystem, and the user service subsystem is used for identifying user operations through a visual interface including an App, a PC client, a web interface, or through a signaling interaction manner such as an open API, an SDK, etc., and invokes the device behavior verification subsystem to return a designated device verification operation set, and the designated device selection manner is as follows: the user service subsystem is also used for receiving user touch notification of verification results, and is responsible for receiving the verification execution results of equipment of the equipment behavior verification system, notifying the results to the user, wherein the touch user mode comprises short messages, mails, instant chat tools, app pushing and the like, and the verification result expression forms comprise pictures, two-dimensional codes, URLs, user visual interface interactions and the like; the device management subsystem is used for providing a device management function for intelligent devices, comprises HTTP, COAP, MQTT in an interactive form with the Internet of things device, is based on interactive protocols such as a TCP customization protocol, has the anti-replay capability naturally, can ensure confidentiality and integrity, and is also used for establishing connection with the Internet of things device, receiving information reported by the Internet of things device and issuing device operation; the binding relationship management subsystem is used for the management functions of binding relationship between the user account and the Internet of things equipment and comprises checking, inquiring, binding and unbinding equipment, wherein equipment binding is responsible for providing binding between the Internet of things equipment and the user account, designating a user as an owner of the Internet of things equipment and writing the user into a persistent storage, checking the binding relationship, providing the inquiring and checking functions of the equipment bound by the user, unbinding the equipment and the user account, and deleting corresponding items in the persistent storage; the risk automatic judging subsystem is used for providing an automatic identification and judging function of the risk of the login account, automatically judging the login risk level based on login attributes, further configuring a system of different levels of login strategies, risk factors include but are not limited to login terminals, login IP, login areas, login time, account status and the like, login terminal management is responsible for providing addition, deletion and verification of the login terminals, writing the login terminal into persistent storage, and checking the login terminals as a process of comparing login terminal characteristics with allowed login terminals under the account and returning results; the device behavior verification subsystem provides a verification function of a device operation set and a behavior event, device behavior management is responsible for providing a device overall verification operation association relation adding, deleting and checking, a behavior relation establishing method comprises the steps of but not limited to intelligent generation, platform operator configuration, first generation and reconfiguration according to device capability, device verification operation set generation, device behavior event verification, device operation event judgment, trust relation establishment judging and result feedback to a user management system through random distribution, operator manual assignment and other modes.
It should also be noted that, as shown in fig. 6, taking the internet of things device as an intelligent door lock as an example, the service flow chart of the internet of things system includes the following steps: the receiving end is a client end, the receiving end receives second user account information input by a user and sends a login request to the internet of things platform, the login request comprises the second user account information, login time information and client characteristic information, the internet of things platform determines whether the second user account information is matched with an ID of an intelligent door lock or not, namely, whether the user account is bound with the intelligent door lock or not is determined, the binding is carried out in the next step, if not, login is not approved, a login risk level is determined according to the login request, operation prompts with different complexity are generated according to the login risk level, the operation prompts of the intelligent door lock are issued to the receiving end, the user is prompted to operate the intelligent door lock according to prompt content, the user triggers a designated action of designating the intelligent door lock, the equipment end (the intelligent door lock) records user operation events and input values according to a stipulated format and uploads the user operation events and input values to the internet of things platform, and the internet of things platform determines whether the login request is passed or not according to operations acting on the intelligent door lock, namely, the operation events and the input values of a verifier are determined.
The login device of the internet of things platform comprises a processor and a memory, wherein the first receiving unit, the first determining unit, the generating unit, the second determining unit and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel can be provided with one or more than one kernel, and the problem of low security of the login of the Internet of things in the prior art is solved by adjusting kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
An embodiment of the present invention provides a computer-readable storage medium having stored thereon a program which, when executed by a processor, implements the above-described method.
The embodiment of the invention provides a processor, which is used for running a program, wherein the method is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program stored in the memory and capable of running on the processor, wherein the processor realizes at least the following steps when executing the program:
Step S101, receiving a login request sent by a client, wherein the login request at least comprises second user account information;
step S102, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment;
step S103, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one;
step S104, according to the operation on the Internet of things equipment, judging whether the login request is passed.
Or alternatively, the process may be performed,
step S201, receiving input second user account information and generating a login request, wherein the login request at least comprises the second user account information;
step S202, the login request is sent to the Internet of things platform;
step S203, receiving binding information fed back by the Internet of things platform, wherein the binding information is used for representing whether the second user account information is matched with the ID of the Internet of things equipment;
step S204, receiving an operation prompt sent by the Internet of things platform when the second user account information is matched with the ID of the Internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the Internet of things device, the operation prompt is generated by the Internet of things platform according to a login risk level, the login risk level is determined by the Internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one;
Step S205, receiving a verification result, wherein the verification result is determined by the Internet of things platform according to the operation acting on the Internet of things equipment;
step S206, determining whether the login is successful according to the verification result.
The device herein may be a server, PC, PAD, cell phone, etc.
The application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with at least the following method steps:
step S101, receiving a login request sent by a client, wherein the login request at least comprises second user account information;
step S102, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment;
step S103, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one;
step S104, according to the operation on the Internet of things equipment, judging whether the login request is passed.
Or alternatively, the process may be performed,
step S201, receiving input second user account information and generating a login request, wherein the login request at least comprises the second user account information;
Step S202, the login request is sent to the Internet of things platform;
step S203, receiving binding information fed back by the Internet of things platform, wherein the binding information is used for representing whether the second user account information is matched with the ID of the Internet of things equipment;
step S204, receiving an operation prompt sent by the Internet of things platform when the second user account information is matched with the ID of the Internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the Internet of things device, the operation prompt is generated by the Internet of things platform according to a login risk level, the login risk level is determined by the Internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one;
step S205, receiving a verification result, wherein the verification result is determined by the Internet of things platform according to the operation acting on the Internet of things equipment;
step S206, determining whether the login is successful according to the verification result.
In the foregoing embodiments of the present invention, the descriptions of the embodiments are emphasized, and for a portion of this disclosure that is not described in detail in this embodiment, reference is made to the related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed technology may be implemented in other manners. The above-described embodiments of the apparatus are merely exemplary, and the division of the units may be a logic function division, and there may be another division manner when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some interfaces, units or modules, or may be in electrical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a computer readable storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server or a network device, etc.) to perform all or part of the steps of the above-mentioned methods of the various embodiments of the present application. And the aforementioned computer-readable storage medium includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
From the above description, it can be seen that the above embodiments of the present application achieve the following technical effects:
1) In the login method of the internet of things platform, firstly, a login request sent by a client is received, wherein the login request at least comprises second user account information; then, determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment; then, generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; and finally, judging whether the login request is passed or not according to the operation acted on the Internet of things equipment. According to the login method, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not passed through when the operation is completed, and compared with the password or short message verification code login in the prior art, the risk of mobile phone theft or password leakage is avoided by the login method, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
2) In the login method of the internet of things platform, firstly, input second user account information is received, and a login request is generated, wherein the login request at least comprises the second user account information; then, sending the login request to the Internet of things platform; then, binding information fed back by the Internet of things platform is received, wherein the binding information is used for representing whether the second user account information is matched with the ID of the Internet of things device or not; then, receiving an operation prompt sent by the internet of things platform under the condition that the second user account information is matched with the ID of the internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to login risk levels, the login risk levels are determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk levels one by one; and then receiving a verification result, wherein the verification result is determined by the Internet of things platform according to the operation on the Internet of things equipment, and finally determining whether the login is successful according to the verification result. According to the login method, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that according to the operation on the Internet of things equipment, a verification result is determined, whether the login is successful or not is determined, namely, the login is successful if the operation is completed, and the login fails if the operation is not completed.
3) In the login device of the internet of things platform, a first receiving unit receives a login request sent by a client, wherein the login request at least comprises second user account information; the first determining unit determines a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things device; the generation unit generates an operation prompt according to the login risk level and sends the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; the second determination unit determines whether the login request is passed or not according to an operation acting on the internet of things device. The login device determines the login risk level according to the login request and generates an operation prompt according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not performed through the login request if the operation is not completed, and compared with the password or short message verification code login in the prior art, the login method avoids the risk of mobile phone theft or password leakage, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
4) In the login device of the internet of things platform, the second receiving unit receives the input second user account information and generates a login request, wherein the login request at least comprises the second user account information; the sending unit sends the login request to the Internet of things platform; a third receiving unit receives binding information fed back by the internet of things platform, wherein the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not; a fourth receiving unit receives an operation prompt sent by the internet of things platform when the second user account information is matched with the ID of the internet of things device, where the operation prompt is used to instruct a user to perform a corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, and the operation prompt corresponds to the login risk level one by one; the sixth receiving unit receives a verification result, the verification result is determined by the internet of things platform according to the operation acting on the internet of things device, and the third determining unit determines whether login is successful according to the verification result. The login device determines the login risk level according to the login request and generates an operation prompt according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that according to the operation on the Internet of things equipment, a verification result is determined, whether the login is successful or not is determined, namely, the login is successful if the operation is completed, and the login fails if the operation is not completed.
5) The Internet of things system comprises an Internet of things platform, internet of things equipment and a login device of the Internet of things platform, wherein a first receiving unit receives a login request sent by a client, and the login request at least comprises second user account information; the first determining unit determines a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things device; the generation unit generates an operation prompt according to the login risk level and sends the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one; the second determination unit determines whether the login request is passed or not according to an operation acting on the internet of things device. According to the Internet of things system, the login risk level is determined according to the login request, and an operation prompt is generated according to the login risk level to instruct a user to execute corresponding operation on the Internet of things equipment, so that whether the operation is performed through the login request is judged according to the operation on the Internet of things equipment, namely, the operation is completed, the login request is not performed through the operation, and compared with the password or short message verification code login in the prior art, the login method avoids the risk of mobile phone theft or password leakage, namely, the login safety is improved, and the problem of low Internet of things login safety in the prior art is solved.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (14)

1. The login method of the internet of things platform is used for storing the ID of the internet of things equipment and corresponding first user account information, and is characterized by comprising the following steps:
receiving a login request sent by a client, wherein the login request at least comprises second user account information;
determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment;
generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one;
determining whether the login request is passed according to the operation acted on the Internet of things equipment; before determining the login risk level according to the login request, the method further comprises: under the condition that the second user account information is consistent with the first user account information, determining that the second user account information is matched with the ID of the corresponding Internet of things equipment; the login request further comprises login time information and client characteristic information, the client characteristic information comprises client information, an IP address and login area information, the Internet of things platform is further used for storing a client information table, an IP address information table, a login area information table and preset time period information, the client information table comprises client information of historical login of the Internet of things platform, the IP address information table comprises information of IP addresses of historical login of the Internet of things platform, the login area information table comprises information of historical login areas of the Internet of things platform, and the login risk level is determined according to the login request and comprises: determining whether an abnormal state exists, the abnormal state being one of: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a preset time period corresponding to the preset time period information; and judging the login risk level according to the number of the existing abnormal states.
2. The method of claim 1, wherein, in the case where the second user account information matches the ID of the internet of things device, before determining a login risk level according to the login request, the method further comprises:
and under the condition that the second user account information is inconsistent with the first user account information, judging that the login request is not passed.
3. The method of claim 1, wherein determining whether to pass the login request according to an operation acting on the internet of things device comprises:
sending the operation prompt to the client;
receiving an execution result of the operation prompt;
verifying the execution result to obtain a verification result;
and judging whether the login request is passed or not according to the verification result.
4. A method according to claim 3, wherein said determining said login risk level based on the number of said abnormal states present comprises:
determining that the login risk level is a low login risk level when no abnormal state exists;
determining that the login risk level is a medium login risk level under the condition that one or two abnormal states exist;
And determining that the login risk level is a high login risk level when the abnormal states are greater than or equal to three abnormal states.
5. The method of claim 4, wherein the internet of things device is an intelligent door lock, generating an operation prompt according to the login risk level and sending the operation prompt to the client, comprising:
when the login risk level is the low login risk level, the generated operation prompt is that door opening operation and door closing operation are completed within a first preset time;
when the login risk level is the medium login risk level, the generated operation prompt is that the door opening operation, the dynamic password input and the door closing operation are completed within a second preset time;
and under the condition that the login risk level is the high login risk level, the generated operation prompt is that the door opening operation, the dynamic password input, the door closing operation and the restarting operation are completed within a third preset time, wherein the first preset time is longer than the second preset time, and the second preset time is longer than the third preset time.
6. The method of claim 4, wherein prior to determining whether to pass the login request based on an operation acting on the internet of things device, the method further comprises:
And under the condition that the login risk level is the medium login risk level, executing any one of the following authentication operations: the verification result is obtained through double-factor authentication, biological feature authentication and man-machine interaction authentication;
and under the condition that the login risk level is the high login risk level, executing at least one of the following authentication operations: and obtaining the verification result through double-factor authentication, biological characteristic authentication and man-machine interaction authentication.
7. A method according to claim 3, wherein the execution result includes operation time and operation completion information, and verifying the execution result to obtain a verification result includes:
if the operation time is longer than a preset time or the operation completion information is NO, the verification result is that the operation is not passed, and the operation completion information is that the operation corresponding to the operation prompt is not completed;
and when the operation time is less than or equal to the preset time and the operation completion information is yes, the verification result is that the operation is passed, and the operation completion information is that all the operations corresponding to the operation prompt are completed.
8. A method according to claim 3, wherein determining whether the login request is passed based on the authentication result comprises:
If the verification result is not passed, the login request is not passed;
and if the verification result is passed, passing the login request.
9. The login method of the internet of things platform is used for storing the ID of the internet of things equipment and corresponding first user account information, and is characterized by comprising the following steps:
receiving input second user account information, and generating a login request, wherein the login request at least comprises the second user account information;
sending the login request to the internet of things platform, wherein the internet of things platform determines that the second user account information is matched with the ID of the corresponding internet of things device under the condition that the second user account information is consistent with the first user account information;
binding information fed back by the internet of things platform is received, wherein the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not;
receiving an operation prompt sent by the internet of things platform under the condition that the second user account information is matched with the ID of the internet of things device, wherein the operation prompt is used for indicating a user to execute corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, the login request further comprises login time information and client characteristic information, the client characteristic information comprises client information, an IP address and login area information, the internet of things platform is further used for storing a client information table, an IP address information table, a login area information table and preset time period information, the client information table comprises client information of historical login of the internet of things platform, the IP address information table comprises information of historical login IP addresses of the internet of things platform, the login area information table comprises information of historical login areas of the internet of things platform, and the internet of things platform determines login risk level according to the login request comprises: determining whether an abnormal state exists, the abnormal state being one of: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a preset time period corresponding to the preset time period information; judging the login risk level according to the number of the existing abnormal states; the operation prompts are in one-to-one correspondence with the login risk levels;
Receiving a verification result, wherein the verification result is determined by the internet of things platform according to the operation acting on the internet of things equipment;
and determining whether the login is successful according to the verification result.
10. The utility model provides a login device of thing networking platform, thing networking platform is used for storing the ID of thing networking equipment and corresponding first user account information, its characterized in that, the device includes:
the first receiving unit is used for receiving a login request sent by the client, wherein the login request at least comprises second user account information;
the first determining unit is used for determining a login risk level according to the login request under the condition that the second user account information is matched with the ID of the Internet of things equipment;
the generating unit is used for generating an operation prompt according to the login risk level and sending the operation prompt to the client, wherein the operation prompt is used for indicating to execute corresponding operation on the Internet of things equipment, and the operation prompt corresponds to the login risk level one by one;
a second determining unit, configured to determine whether to pass the login request according to an operation acting on the internet of things device; the first determining unit is further configured to determine, before determining a login risk level according to the login request, that the second user account information matches with the ID of the corresponding internet of things device if the second user account information is consistent with the first user account information; the login request further comprises login time information and client characteristic information, the client characteristic information comprises client information, an IP address and login area information, the Internet of things platform is further used for storing a client information table, an IP address information table, a login area information table and preset time period information, the client information table comprises client information of historical login of the Internet of things platform, the IP address information table comprises information of the IP address of the historical login of the Internet of things platform, the login area information table comprises information of the historical login area of the Internet of things platform, the first determining unit comprises a second determining module, the second determining module is used for determining whether an abnormal state exists or not, and the abnormal state is one of the following: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a preset time period corresponding to the preset time period information; the first determining unit is further configured to determine the login risk level according to the number of the existing abnormal states.
11. The utility model provides a login device of thing networking platform, thing networking platform is used for storing the ID of thing networking equipment and corresponding first user account information, its characterized in that, the device includes:
the second receiving unit is used for receiving input second user account information and generating a login request, wherein the login request at least comprises the second user account information;
the sending unit is used for sending the login request to the internet of things platform, and the internet of things platform determines that the second user account information is matched with the ID of the corresponding internet of things device under the condition that the second user account information is consistent with the first user account information;
the third receiving unit is used for receiving binding information fed back by the internet of things platform, and the binding information is used for representing whether the second user account information is matched with the ID of the internet of things device or not;
the fourth receiving unit is configured to receive an operation prompt sent by the internet of things platform when the second user account information is matched with the ID of the internet of things device, where the operation prompt is used to instruct a user to perform a corresponding operation on the internet of things device, the operation prompt is generated by the internet of things platform according to a login risk level, the login risk level is determined by the internet of things platform according to the login request, the login request further includes login time information and client characteristic information, the client characteristic information includes client information, an IP address and login area information, the internet of things platform is further configured to store a client information table, an IP address information table, a login area information table and predetermined time period information, the client information table includes client information of historical login of the internet of things platform, the IP address information table includes information of historical login IP address of the internet of things platform, the login area information table includes information of historical login area of the internet of things platform, and the internet of things platform determines login risk level according to the login request includes: determining whether an abnormal state exists, the abnormal state being one of: the user account corresponding to the second user account information is in a login state, the client information does not exist in the client information table, the IP address does not exist in the IP address information table, the login area information does not exist in the login area information table, and the login time corresponding to the login time information is not within a preset time period corresponding to the preset time period information; judging the login risk level according to the number of the existing abnormal states; the operation prompts are in one-to-one correspondence with the login risk levels;
The sixth receiving unit is used for receiving a verification result, wherein the verification result is determined by the internet of things platform according to the operation acting on the internet of things equipment;
and the third determining unit is used for determining whether the login is successful according to the verification result.
12. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored program, wherein the program performs the method of any one of claims 1 to 9.
13. A processor for running a program, wherein the program when run performs the method of any one of claims 1 to 9.
14. An internet of things system, comprising an internet of things platform, internet of things equipment and a login device of the internet of things platform, wherein the login device of the internet of things platform is used for executing the method of any one of claims 1 to 9.
CN202110827601.XA 2021-07-21 2021-07-21 Login method and login device of Internet of things platform and Internet of things system Active CN113556400B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110827601.XA CN113556400B (en) 2021-07-21 2021-07-21 Login method and login device of Internet of things platform and Internet of things system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110827601.XA CN113556400B (en) 2021-07-21 2021-07-21 Login method and login device of Internet of things platform and Internet of things system

Publications (2)

Publication Number Publication Date
CN113556400A CN113556400A (en) 2021-10-26
CN113556400B true CN113556400B (en) 2023-09-26

Family

ID=78132334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110827601.XA Active CN113556400B (en) 2021-07-21 2021-07-21 Login method and login device of Internet of things platform and Internet of things system

Country Status (1)

Country Link
CN (1) CN113556400B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116760646B (en) * 2023-08-22 2023-10-31 中信消费金融有限公司 Login processing method, login processing device, server and readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655496A (en) * 2011-03-01 2012-09-05 阿里巴巴集团控股有限公司 Logging method, system and device
CN105743931A (en) * 2016-05-11 2016-07-06 百度在线网络技术(北京)有限公司 Control method and device applied to intelligent home platform
CN106453234A (en) * 2016-08-12 2017-02-22 北京东方车云信息技术有限公司 Identity authentication method, relevant server and client
CN107995215A (en) * 2017-12-20 2018-05-04 青岛海信智慧家居系统股份有限公司 Control method, device and the cloud platform server of smart home device
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
KR20200143188A (en) * 2019-06-13 2020-12-23 주식회사 한컴위드 Integrated financial transaction platform apparatus performing a differential login authentication process based on user login security level and operating method thereof
CN112187736A (en) * 2020-09-10 2021-01-05 珠海格力电器股份有限公司 Supply chain account login method and device based on mobile terminal
CN112613020A (en) * 2020-12-31 2021-04-06 中国农业银行股份有限公司 Identity verification method and device
CN113079396A (en) * 2021-03-18 2021-07-06 海南视联通信技术有限公司 Service control method, device, terminal equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856472B (en) * 2012-12-06 2017-08-18 阿里巴巴集团控股有限公司 A kind of method and device of Account Logon
CN107067258A (en) * 2017-03-14 2017-08-18 平安科技(深圳)有限公司 Financial transaction management system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102655496A (en) * 2011-03-01 2012-09-05 阿里巴巴集团控股有限公司 Logging method, system and device
CN105743931A (en) * 2016-05-11 2016-07-06 百度在线网络技术(北京)有限公司 Control method and device applied to intelligent home platform
CN106453234A (en) * 2016-08-12 2017-02-22 北京东方车云信息技术有限公司 Identity authentication method, relevant server and client
CN107995215A (en) * 2017-12-20 2018-05-04 青岛海信智慧家居系统股份有限公司 Control method, device and the cloud platform server of smart home device
CN108183924A (en) * 2018-03-01 2018-06-19 深圳市买买提信息科技有限公司 A kind of login validation method and terminal device
KR20200143188A (en) * 2019-06-13 2020-12-23 주식회사 한컴위드 Integrated financial transaction platform apparatus performing a differential login authentication process based on user login security level and operating method thereof
CN112187736A (en) * 2020-09-10 2021-01-05 珠海格力电器股份有限公司 Supply chain account login method and device based on mobile terminal
CN112613020A (en) * 2020-12-31 2021-04-06 中国农业银行股份有限公司 Identity verification method and device
CN113079396A (en) * 2021-03-18 2021-07-06 海南视联通信技术有限公司 Service control method, device, terminal equipment and storage medium

Also Published As

Publication number Publication date
CN113556400A (en) 2021-10-26

Similar Documents

Publication Publication Date Title
CN105376216B (en) A kind of remote access method, proxy server and client
CN104184705A (en) Verification method, apparatus, server, user data center and system
CN109257391A (en) A kind of access authority opening method, device, server and storage medium
CN103475484B (en) USB key authentication methods and system
CN110795174B (en) Application program interface calling method, device, equipment and readable storage medium
CN104615924A (en) System and method for storing account numbers and passwords for account numbers
CN103888418B (en) Tactful authentication method and system
US11770385B2 (en) Systems and methods for malicious client detection through property analysis
CN109448271A (en) A kind of no card withdrawal method, computer readable storage medium and server
CN103685244A (en) Differentiated authentication method and differentiated authentication device
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN112165454A (en) Access control method, device, gateway and console
CN113556400B (en) Login method and login device of Internet of things platform and Internet of things system
CN107846406A (en) A kind of account logon method and device
CN106209569B (en) Authentication method and device for enterprise instant messaging
CN107645474B (en) Method and device for logging in open platform
US20200021624A1 (en) Secure communication method of ims system based on key file
CN109992940A (en) Auth method, device, system and proof of identity server
CN109274699A (en) Method for authenticating, device, server and storage medium
CN101854357B (en) Method and system for monitoring network authentication
CN103559430A (en) Application account management method and device based on android system
CN116015683A (en) Authentication method, device, equipment and storage medium based on random key
CN110162941A (en) A kind of terminal log-on message store method
CN107172082B (en) File sharing method and system
CN103812843B (en) Method for authenticating and system based on WebService applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant