CN102497398A - Sensor authentication method and system - Google Patents
Sensor authentication method and system Download PDFInfo
- Publication number
- CN102497398A CN102497398A CN2011103908838A CN201110390883A CN102497398A CN 102497398 A CN102497398 A CN 102497398A CN 2011103908838 A CN2011103908838 A CN 2011103908838A CN 201110390883 A CN201110390883 A CN 201110390883A CN 102497398 A CN102497398 A CN 102497398A
- Authority
- CN
- China
- Prior art keywords
- information
- transducer
- terminal installation
- characteristic information
- sends
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Arrangements For Transmission Of Measured Signals (AREA)
Abstract
The invention provides a sensor authentication method and system. The method comprises: a terminal device acquires the characteristic information of a sensor, acquires authentication information according to the characteristic information and a preset encryption algorithm and then sends out an authentication request containing the authentication information to an application platform; the application platform determines whether the information is legal or not according to the authentication information and the prestored legal information, and sends out feedback information to the terminal device according to the judging result; the terminal device determines whether the collected information sent by the sensor needs to be processed or not according to the feedback information. The method and system provided by the invention can be used for solving the problem of illegal invasion of the illegal sensor, avoiding the block of the system data stream and ensuring the stability of the system.
Description
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of transducer authentication method and system.
Background technology
The ubiquitous network network architecture can be divided into perception extended layer, network layer and application layer, wherein, the perception extended layer mainly through transducer realize information gathering, catch, function such as object identification.Network layer comprises Access Network, core net.Access Network relates to technology such as various wired accesses, wireless access, satellite, and core net overlaps with the infrastructure of existing communication network and internet to a large extent.Application layer is finally towards types of applications, realize information processing, collaborative, share, decision-making, application layer relates to multiple technologies such as the Intelligent treatment, Distributed Calculation, middleware, INFORMATION DISCOVERY of magnanimity information.
Wherein, the terminal installation in the network layer is handled or is sent to application layer through the Internet the data of sensor acquisition, and in addition, terminal installation is also transmitted control command that application layer issues so that transducer is controlled to transducer.
But; The computing capability of terminal installation and resource disposal ability have certain limitation; When illegal transducer is connected to this sensor network, understand a large amount of computational resource of consumption systems, reduced the processing speed of terminal installation; The data traffic of having blocked system has influenced the stability of system.
Summary of the invention
To the above-mentioned defective of prior art, the embodiment of the invention provides a kind of transducer authentication method and system.
One aspect of the present invention provides a kind of transducer authentication method, comprising:
After terminal installation obtains the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
It is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Said terminal installation determines whether to handle the Information Monitoring that said transducer sends according to said feedback information.
The present invention provides a kind of transducer Verification System on the other hand, comprising:
Terminal installation after being used to obtain the characteristic information of transducer, obtains authorization information according to said characteristic information and preset encryption algorithm, and sends the checking request that comprises said authorization information to application platform;
Said application platform; It is legal to be used for determining whether according to said authorization information and the legal information that prestores; And send feedback information to said terminal installation according to judged result, determine whether to handle the Information Monitoring that said transducer sends for said terminal installation according to said feedback information.
Transducer authentication method and system that the embodiment of the invention provides; Obtain the characteristic information of transducer at terminal installation after; Obtain authorization information according to characteristic information and preset encryption algorithm; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Solve the illegal invasion problem of illegal transducer, avoided the obstruction of system data flow, guaranteed the stability of system.
Description of drawings
Fig. 1 is the flow chart of an embodiment of transducer authentication method of the present invention;
Fig. 2 is the flow chart of another embodiment of transducer authentication method of the present invention;
Fig. 3 is the structural representation of an embodiment of transducer Verification System of the present invention;
Fig. 4 is the structural representation of another embodiment of transducer Verification System of the present invention.
Embodiment
Fig. 1 is the flow chart of an embodiment of transducer authentication method of the present invention, and as shown in Figure 1, this method comprises:
After step 100, terminal installation are obtained the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
Terminal installation carries out the authorization information that transducer is obtained in encryption according to preset encryption algorithm to the characteristic information of transducer after obtaining the characteristic information of transducer, and sends the checking request that comprises this authorization information to application platform.It should be noted that the characteristic information that one of ordinary skill in the art will appreciate that transducer is used for the uniqueness of mark sensor, its concrete content is set according to the concrete form of transducer, and present embodiment does not limit this.
Application platform can be in advance carried out encryption through encryption equipment to the characteristic information of legal transducer and is generated legal information, and the legal information of the transducer of encryption equipment output is stored in this locality.It is understandable that the AES that encryption equipment adopted is consistent with the AES that terminal installation adopted in the above-mentioned steps 100.Therefore; Application platform parses the authorization information that need verify after the checking request that receives the terminal installation transmission; Authorization information and local legal information are compared the back confirm whether this authorization information is legal, and send feedback information to terminal installation according to judged result.
Terminal installation receives the feedback information that application platform is sent; If know that according to feedback information transducer is legal; Then receive the also Information Monitoring of processes sensor transmission; If know that according to feedback information transducer is illegal, then reject the Information Monitoring that transducer sends, and send warning message to transducer.
The transducer authentication method that present embodiment provides; Obtain the characteristic information of transducer at terminal installation after; Obtain authorization information according to characteristic information and preset encryption algorithm; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Solve the illegal invasion problem of illegal transducer, avoided the obstruction of system data flow, guaranteed the stability of system.
Fig. 2 is the flow chart of another embodiment of transducer authentication method of the present invention, and as shown in Figure 2, this method comprises:
Transducer is after the characteristic information that receiver terminal device sends obtains request; To terminal installation backout feature table; Mark sheet has specifically described all attribute informations of transducer, comprises information such as sensor die block identification, manufacturer, software version, and is as shown in table 1:
Table 1
Structure | Content | Length (Byte) | Explanation |
Ground field | |
2 | |
The ID of |
2 | ||
|
1 | ||
|
2 | ||
...... | ...... | ...... | |
Extension field | The sensor die |
2 | |
|
1 | ||
|
1 | Confirm range | |
...... | ...... | ...... | |
...... | ...... | ...... | ...... |
Terminal installation is behind the mark sheet that obtains the transducer transmission, according to preset information extraction rule characteristic information extraction from this mark sheet; The information extraction rule should be looked concrete system requirements and decided, such as, if the transducer of system is less, when computational resource takes it easy, can attribute informations all in the mark sheet be handled as characteristic information; If the transducer of system is more; Computational resource is valuable; Just handle as characteristic information according to a part of attribute information in the preset information extraction Rule Extraction mark sheet; It should be noted that the uniqueness that the part attribute information that extracted should be able to mark sensor, such as information such as sensor die block identifications.
Terminal installation is mainly used in sensor acquisition information processing and transmission, often needs to carry out alternately with other network element device and data processing equipment, so is interfered easily.For the fail safe that guarantees further to encrypt, will transfer to identification module to the encryption function of characteristic information and handle.Identification module can be independent advanced security treatment system; Also can utilize existing equipment; Such as, if inner client identification module (Subscriber Identity Module, SIM) card of embedding of terminal installation; Be sent to other application platform through network through SIM completion networking authentication and with the Information Monitoring that transducer sends; At this moment, can be with SIM as identification module and at the inner AES that loads of SIM, SIM is through the characteristic information of the transducer of 7816 agreement receiver terminal devices transmission; And utilize AES that the characteristic information of transducer is carried out encryption and obtain authorization information, and return authorization information to terminal installation through 7816 agreements.
Application platform can be obtained the mark sheet of legal transducer in advance; And according to preset information extraction rule characteristic information extraction from mark sheet; According to preset encryption algorithm characteristic information is carried out the legal information that transducer is obtained in encryption, and the legal information of encryption equipment output is stored in this locality.It is understandable that, information extraction that terminal installation adopts rule in the information extraction rule that encryption equipment adopted and AES and the above-mentioned steps 202, and the AES that terminal installation adopted in the step 203 is consistent.Therefore; Application platform parses the authorization information that need verify after the checking request that receives the terminal installation transmission; Authorization information and local legal information are compared the back confirm whether this authorization information is legal, and send feedback information to terminal installation according to judged result.
Terminal installation receives the feedback information that application platform is sent; If know that according to feedback information transducer is legal, then receive the also Information Monitoring of processes sensor transmission, if know that according to feedback information transducer is illegal; Then reject the Information Monitoring that transducer sends; And send warning message to transducer, know that the power supply of this transducer depends on local system if terminal installation is judged, then to electric supply installation send comprise sensor identification power off command so that this transducer is carried out power down process.
The transducer authentication method that present embodiment provides; Obtain the characteristic information of transducer at terminal installation after; According to preset encryption algorithm characteristic information is carried out encryption through identification module and obtain authorization information; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Because the fail safe of identification module itself is higher, be difficult under attack, thereby solved the illegal invasion problem of illegal transducer further, avoided the obstruction of system data flow, guaranteed the stability of system.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 3 is the structural representation of an embodiment of transducer Verification System of the present invention; As shown in Figure 3; This system comprises: terminal installation 1 and application platform 2, wherein, after terminal installation 1 is used to obtain the characteristic information of transducer; Obtain authorization information according to characteristic information and preset encryption algorithm, and send the checking request that comprises authorization information to application platform 2; It is legal that application platform 2 is used for determining whether according to authorization information and the legal information that prestores, and send feedback information according to judged result to terminal installation 1, determines whether to handle the Information Monitoring that said transducer sends for terminal installation 1 according to feedback information.
The function and the handling process of each module in the transducer Verification System that present embodiment provides can be referring to above-mentioned method embodiment shown in Figure 1, and its realization principle and technique effect are similar, repeat no more here.
Fig. 4 is the structural representation of another embodiment of transducer Verification System of the present invention; As shown in Figure 4; Based on embodiment illustrated in fig. 3, this system also comprises: identification module 3 is used for the characteristic information that receiver terminal device 1 sends; And obtain authorization information according to preset encryption algorithm and characteristic information, and return authorization information to terminal installation 1.
In the present embodiment, terminal installation 1 specifically is used for: send characteristic information to transducer and obtain request, and the mark sheet that returns of receiving sensor, and obtain characteristic information according to mark sheet and preset information extraction rule.
Further, terminal installation 1 also is used for then transducer being carried out power down process if feedback information representes that transducer is illegal.
The function and the handling process of each module in the transducer Verification System that present embodiment provides can be referring to above-mentioned method embodiment shown in Figure 2, and its realization principle and technique effect are similar, repeat no more here.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.
Claims (9)
1. a transducer authentication method is characterized in that, comprising:
After terminal installation obtains the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
It is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Said terminal installation determines whether to handle the Information Monitoring that said transducer sends according to said feedback information.
2. transducer authentication method according to claim 1 is characterized in that, said terminal installation obtains authorization information according to the characteristic information and the preset encryption algorithm of transducer, comprising:
Said terminal installation sends to identification module with said characteristic information;
Said identification module obtains said authorization information according to preset encryption algorithm and said characteristic information, and sends said authorization information to said terminal installation.
3. transducer authentication method according to claim 1 and 2 is characterized in that, if said feedback information representes that said transducer is illegal, then said method also comprises:
Said terminal installation carries out power down process to said transducer.
4. transducer authentication method according to claim 1 and 2 is characterized in that, the characteristic information that said terminal installation obtains transducer comprises:
Said terminal installation sends characteristic information to said transducer and obtains request;
Said transducer is to said terminal installation backout feature table;
Said terminal installation obtains said characteristic information according to said mark sheet and preset information extraction rule.
5. transducer authentication method according to claim 4 is characterized in that,
Carry out data interaction through wired or wireless transmission between said terminal installation and the said transducer.
6. a transducer Verification System is characterized in that, comprising:
Terminal installation after being used to obtain the characteristic information of transducer, obtains authorization information according to said characteristic information and preset encryption algorithm, and sends the checking request that comprises said authorization information to application platform;
Said application platform; It is legal to be used for determining whether according to said authorization information and the legal information that prestores; And send feedback information to said terminal installation according to judged result, determine whether to handle the Information Monitoring that said transducer sends for said terminal installation according to said feedback information.
7. transducer Verification System according to claim 6 is characterized in that, said system also comprises:
Identification module is used to receive the said characteristic information that said terminal installation sends, and obtains said authorization information according to preset encryption algorithm and said characteristic information, and returns said authorization information to said terminal installation.
8. according to claim 6 or 7 described transducer Verification Systems, it is characterized in that said terminal installation also is used for:
If said feedback information representes that said transducer is illegal, then said transducer is carried out power down process.
9. according to claim 6 or 7 described transducer Verification Systems, it is characterized in that said terminal installation specifically is used for:
Send characteristic information to said transducer and obtain request, and receive the mark sheet that said transducer returns, and obtain said characteristic information according to said mark sheet and preset information extraction rule.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110390883.8A CN102497398B (en) | 2011-11-30 | 2011-11-30 | Sensor authentication method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110390883.8A CN102497398B (en) | 2011-11-30 | 2011-11-30 | Sensor authentication method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102497398A true CN102497398A (en) | 2012-06-13 |
CN102497398B CN102497398B (en) | 2014-09-17 |
Family
ID=46189183
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110390883.8A Active CN102497398B (en) | 2011-11-30 | 2011-11-30 | Sensor authentication method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102497398B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801723A (en) * | 2012-08-09 | 2012-11-28 | 福建物联天下信息科技有限公司 | Access device and method for Internet of things |
CN103841119A (en) * | 2014-03-25 | 2014-06-04 | 广州物联家信息科技股份有限公司 | Method and system for achieving equipment access authentication based on Home-IOT cloud gateway |
CN104270342A (en) * | 2014-09-11 | 2015-01-07 | 深圳市深信服电子科技有限公司 | Access method and system for virtual desktop |
CN106128061A (en) * | 2016-08-29 | 2016-11-16 | 苏州盖恩茨电子科技有限公司 | A kind of terminal matched motor drive signal harvester |
CN106227101A (en) * | 2016-08-29 | 2016-12-14 | 苏州盖恩茨电子科技有限公司 | A kind of intelligent terminal's matched safety signal harvester |
CN112243008A (en) * | 2020-10-16 | 2021-01-19 | 中国联合网络通信集团有限公司 | Data management method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060036442A1 (en) * | 2004-07-30 | 2006-02-16 | Sbc Knowledge Ventures, L.P. | Centralized biometric authentication |
CN1951326A (en) * | 2006-11-03 | 2007-04-25 | 北京飞天诚信科技有限公司 | Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal |
CN102026188A (en) * | 2010-12-09 | 2011-04-20 | 中国联合网络通信集团有限公司 | Authentication method, equipment and system |
CN102065423A (en) * | 2010-12-13 | 2011-05-18 | 中国联合网络通信集团有限公司 | Node access authentication method, access authenticated node, access node and communication system |
-
2011
- 2011-11-30 CN CN201110390883.8A patent/CN102497398B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060036442A1 (en) * | 2004-07-30 | 2006-02-16 | Sbc Knowledge Ventures, L.P. | Centralized biometric authentication |
CN1951326A (en) * | 2006-11-03 | 2007-04-25 | 北京飞天诚信科技有限公司 | Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal |
CN102026188A (en) * | 2010-12-09 | 2011-04-20 | 中国联合网络通信集团有限公司 | Authentication method, equipment and system |
CN102065423A (en) * | 2010-12-13 | 2011-05-18 | 中国联合网络通信集团有限公司 | Node access authentication method, access authenticated node, access node and communication system |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102801723A (en) * | 2012-08-09 | 2012-11-28 | 福建物联天下信息科技有限公司 | Access device and method for Internet of things |
CN102801723B (en) * | 2012-08-09 | 2016-08-03 | 福建物联天下信息科技股份有限公司 | Internet of things access equipment and method |
CN103841119A (en) * | 2014-03-25 | 2014-06-04 | 广州物联家信息科技股份有限公司 | Method and system for achieving equipment access authentication based on Home-IOT cloud gateway |
CN103841119B (en) * | 2014-03-25 | 2017-12-01 | 广州物联家信息科技股份有限公司 | The method and system for realizing equipment access authentication are closed based on Home IOT clouds |
CN104270342A (en) * | 2014-09-11 | 2015-01-07 | 深圳市深信服电子科技有限公司 | Access method and system for virtual desktop |
CN104270342B (en) * | 2014-09-11 | 2017-10-20 | 深信服科技股份有限公司 | The access method and system of virtual desktop |
CN106128061A (en) * | 2016-08-29 | 2016-11-16 | 苏州盖恩茨电子科技有限公司 | A kind of terminal matched motor drive signal harvester |
CN106227101A (en) * | 2016-08-29 | 2016-12-14 | 苏州盖恩茨电子科技有限公司 | A kind of intelligent terminal's matched safety signal harvester |
CN112243008A (en) * | 2020-10-16 | 2021-01-19 | 中国联合网络通信集团有限公司 | Data management method and device |
Also Published As
Publication number | Publication date |
---|---|
CN102497398B (en) | 2014-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102497398B (en) | Sensor authentication method and system | |
CN102571950B (en) | Media content providing and acquiring methods, server and user terminal | |
US10341367B1 (en) | System and method for inquiring IOC information by P2P protocol | |
US9614723B2 (en) | Device commissioning | |
CN102104883B (en) | Method and system for defining information in machine-to-machine (M2M) platform and M2M platform | |
CN109870968B (en) | Intelligent security system | |
CN104703182A (en) | Zigbee-based networking method and network system | |
CN108282453B (en) | Internet of things reading device, safe access method and control center equipment | |
CN109309650B (en) | Data processing method, terminal equipment and network equipment | |
CN105246096A (en) | Quick access method for low-power consumption Internet of things equipment | |
KR102148757B1 (en) | Method and apparatus for transmitting/receiving data in a communication system | |
CN104320250A (en) | Anti-counterfeiting authentication method based on NFC chip | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN110535877A (en) | Internet-of-things terminal identity identifying method and Verification System based on double authentication | |
CN102801713A (en) | Website logging-in method and system as well as accessing management platform | |
CN105262752A (en) | Data processing method and device of virtual key, mobile terminal and server | |
KR101775823B1 (en) | Method and system for controlling device based internet of things | |
CN110198533B (en) | Method for remotely controlling BLE Bluetooth device and BLE Bluetooth device | |
CN107404722B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN102523580A (en) | M2M (Machine-to-Machine/Man) service terminal data processing method and M2M service card as well as M2M terminal data processing card | |
CN114666074B (en) | Product identification authentication method and device | |
CN104754041A (en) | Internet of things communication method and related devices | |
EP3562194B1 (en) | Method for identifying at least one network slice configuration of a mobile network, communication system, and automation system | |
CN111127706B (en) | Intelligent lock control method, intelligent lock, cloud server and computing equipment | |
US11140001B2 (en) | Method for providing data packets from a CAN bus, control device and system having a CAN bus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |