CN102497398A - Sensor authentication method and system - Google Patents

Sensor authentication method and system Download PDF

Info

Publication number
CN102497398A
CN102497398A CN2011103908838A CN201110390883A CN102497398A CN 102497398 A CN102497398 A CN 102497398A CN 2011103908838 A CN2011103908838 A CN 2011103908838A CN 201110390883 A CN201110390883 A CN 201110390883A CN 102497398 A CN102497398 A CN 102497398A
Authority
CN
China
Prior art keywords
information
transducer
terminal installation
characteristic information
sends
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103908838A
Other languages
Chinese (zh)
Other versions
CN102497398B (en
Inventor
孙利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201110390883.8A priority Critical patent/CN102497398B/en
Publication of CN102497398A publication Critical patent/CN102497398A/en
Application granted granted Critical
Publication of CN102497398B publication Critical patent/CN102497398B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Arrangements For Transmission Of Measured Signals (AREA)

Abstract

The invention provides a sensor authentication method and system. The method comprises: a terminal device acquires the characteristic information of a sensor, acquires authentication information according to the characteristic information and a preset encryption algorithm and then sends out an authentication request containing the authentication information to an application platform; the application platform determines whether the information is legal or not according to the authentication information and the prestored legal information, and sends out feedback information to the terminal device according to the judging result; the terminal device determines whether the collected information sent by the sensor needs to be processed or not according to the feedback information. The method and system provided by the invention can be used for solving the problem of illegal invasion of the illegal sensor, avoiding the block of the system data stream and ensuring the stability of the system.

Description

Transducer authentication method and system
Technical field
The embodiment of the invention relates to communication technical field, relates in particular to a kind of transducer authentication method and system.
Background technology
The ubiquitous network network architecture can be divided into perception extended layer, network layer and application layer, wherein, the perception extended layer mainly through transducer realize information gathering, catch, function such as object identification.Network layer comprises Access Network, core net.Access Network relates to technology such as various wired accesses, wireless access, satellite, and core net overlaps with the infrastructure of existing communication network and internet to a large extent.Application layer is finally towards types of applications, realize information processing, collaborative, share, decision-making, application layer relates to multiple technologies such as the Intelligent treatment, Distributed Calculation, middleware, INFORMATION DISCOVERY of magnanimity information.
Wherein, the terminal installation in the network layer is handled or is sent to application layer through the Internet the data of sensor acquisition, and in addition, terminal installation is also transmitted control command that application layer issues so that transducer is controlled to transducer.
But; The computing capability of terminal installation and resource disposal ability have certain limitation; When illegal transducer is connected to this sensor network, understand a large amount of computational resource of consumption systems, reduced the processing speed of terminal installation; The data traffic of having blocked system has influenced the stability of system.
Summary of the invention
To the above-mentioned defective of prior art, the embodiment of the invention provides a kind of transducer authentication method and system.
One aspect of the present invention provides a kind of transducer authentication method, comprising:
After terminal installation obtains the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
It is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Said terminal installation determines whether to handle the Information Monitoring that said transducer sends according to said feedback information.
The present invention provides a kind of transducer Verification System on the other hand, comprising:
Terminal installation after being used to obtain the characteristic information of transducer, obtains authorization information according to said characteristic information and preset encryption algorithm, and sends the checking request that comprises said authorization information to application platform;
Said application platform; It is legal to be used for determining whether according to said authorization information and the legal information that prestores; And send feedback information to said terminal installation according to judged result, determine whether to handle the Information Monitoring that said transducer sends for said terminal installation according to said feedback information.
Transducer authentication method and system that the embodiment of the invention provides; Obtain the characteristic information of transducer at terminal installation after; Obtain authorization information according to characteristic information and preset encryption algorithm; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Solve the illegal invasion problem of illegal transducer, avoided the obstruction of system data flow, guaranteed the stability of system.
Description of drawings
Fig. 1 is the flow chart of an embodiment of transducer authentication method of the present invention;
Fig. 2 is the flow chart of another embodiment of transducer authentication method of the present invention;
Fig. 3 is the structural representation of an embodiment of transducer Verification System of the present invention;
Fig. 4 is the structural representation of another embodiment of transducer Verification System of the present invention.
Embodiment
Fig. 1 is the flow chart of an embodiment of transducer authentication method of the present invention, and as shown in Figure 1, this method comprises:
After step 100, terminal installation are obtained the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
Terminal installation carries out the authorization information that transducer is obtained in encryption according to preset encryption algorithm to the characteristic information of transducer after obtaining the characteristic information of transducer, and sends the checking request that comprises this authorization information to application platform.It should be noted that the characteristic information that one of ordinary skill in the art will appreciate that transducer is used for the uniqueness of mark sensor, its concrete content is set according to the concrete form of transducer, and present embodiment does not limit this.
Step 101, it is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Application platform can be in advance carried out encryption through encryption equipment to the characteristic information of legal transducer and is generated legal information, and the legal information of the transducer of encryption equipment output is stored in this locality.It is understandable that the AES that encryption equipment adopted is consistent with the AES that terminal installation adopted in the above-mentioned steps 100.Therefore; Application platform parses the authorization information that need verify after the checking request that receives the terminal installation transmission; Authorization information and local legal information are compared the back confirm whether this authorization information is legal, and send feedback information to terminal installation according to judged result.
Step 102, said terminal installation determines whether to handle the Information Monitoring that said transducer sends according to said feedback information.
Terminal installation receives the feedback information that application platform is sent; If know that according to feedback information transducer is legal; Then receive the also Information Monitoring of processes sensor transmission; If know that according to feedback information transducer is illegal, then reject the Information Monitoring that transducer sends, and send warning message to transducer.
The transducer authentication method that present embodiment provides; Obtain the characteristic information of transducer at terminal installation after; Obtain authorization information according to characteristic information and preset encryption algorithm; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Solve the illegal invasion problem of illegal transducer, avoided the obstruction of system data flow, guaranteed the stability of system.
Fig. 2 is the flow chart of another embodiment of transducer authentication method of the present invention, and as shown in Figure 2, this method comprises:
Step 200, terminal installation sends characteristic information to transducer and obtains request, it should be noted that; Data interactive mode between terminal installation and the transducer can be provided with according to concrete application system; Present embodiment does not limit this, such as, terminal installation can be through carrying out data interaction between wire transmission or wireless transmission and the transducer; Wire transmission comprises optical fiber, coaxial cable etc., and wireless transmission comprises: Bluetooth transmission and zigbee transmission etc.
Step 201, said transducer is to said terminal installation backout feature table;
Transducer is after the characteristic information that receiver terminal device sends obtains request; To terminal installation backout feature table; Mark sheet has specifically described all attribute informations of transducer, comprises information such as sensor die block identification, manufacturer, software version, and is as shown in table 1:
Table 1
Structure Content Length (Byte) Explanation
Ground field Sensor assembly ID 2
The ID of manufacturer 2
Software version 1
Sequence number 2
...... ...... ......
Extension field The sensor die block type 2
Speed 1
Unit 1 Confirm range
...... ...... ......
...... ...... ...... ......
Step 202, terminal installation obtains characteristic information according to mark sheet and preset information extraction rule;
Terminal installation is behind the mark sheet that obtains the transducer transmission, according to preset information extraction rule characteristic information extraction from this mark sheet; The information extraction rule should be looked concrete system requirements and decided, such as, if the transducer of system is less, when computational resource takes it easy, can attribute informations all in the mark sheet be handled as characteristic information; If the transducer of system is more; Computational resource is valuable; Just handle as characteristic information according to a part of attribute information in the preset information extraction Rule Extraction mark sheet; It should be noted that the uniqueness that the part attribute information that extracted should be able to mark sensor, such as information such as sensor die block identifications.
Step 203, said terminal installation sends to identification module with said characteristic information, obtains said authorization information and sends to said terminal installation according to preset encryption algorithm and said characteristic information for said identification module;
Terminal installation is mainly used in sensor acquisition information processing and transmission, often needs to carry out alternately with other network element device and data processing equipment, so is interfered easily.For the fail safe that guarantees further to encrypt, will transfer to identification module to the encryption function of characteristic information and handle.Identification module can be independent advanced security treatment system; Also can utilize existing equipment; Such as, if inner client identification module (Subscriber Identity Module, SIM) card of embedding of terminal installation; Be sent to other application platform through network through SIM completion networking authentication and with the Information Monitoring that transducer sends; At this moment, can be with SIM as identification module and at the inner AES that loads of SIM, SIM is through the characteristic information of the transducer of 7816 agreement receiver terminal devices transmission; And utilize AES that the characteristic information of transducer is carried out encryption and obtain authorization information, and return authorization information to terminal installation through 7816 agreements.
Step 204, terminal installation receives the authorization information that identification module sends, and sends the checking request that comprises said authorization information to application platform;
Step 205, it is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Application platform can be obtained the mark sheet of legal transducer in advance; And according to preset information extraction rule characteristic information extraction from mark sheet; According to preset encryption algorithm characteristic information is carried out the legal information that transducer is obtained in encryption, and the legal information of encryption equipment output is stored in this locality.It is understandable that, information extraction that terminal installation adopts rule in the information extraction rule that encryption equipment adopted and AES and the above-mentioned steps 202, and the AES that terminal installation adopted in the step 203 is consistent.Therefore; Application platform parses the authorization information that need verify after the checking request that receives the terminal installation transmission; Authorization information and local legal information are compared the back confirm whether this authorization information is legal, and send feedback information to terminal installation according to judged result.
Step 206, said terminal installation is handled according to said feedback information.
Terminal installation receives the feedback information that application platform is sent; If know that according to feedback information transducer is legal, then receive the also Information Monitoring of processes sensor transmission, if know that according to feedback information transducer is illegal; Then reject the Information Monitoring that transducer sends; And send warning message to transducer, know that the power supply of this transducer depends on local system if terminal installation is judged, then to electric supply installation send comprise sensor identification power off command so that this transducer is carried out power down process.
The transducer authentication method that present embodiment provides; Obtain the characteristic information of transducer at terminal installation after; According to preset encryption algorithm characteristic information is carried out encryption through identification module and obtain authorization information; And send to application platform and to comprise the checking request of authorization information, thereby it is legal to make that application platform determines whether according to authorization information and the legal information that prestores, and send feedback information to terminal installation according to judged result; Determine whether the Information Monitoring that processes sensor is sent for terminal installation according to feedback information.Because the fail safe of identification module itself is higher, be difficult under attack, thereby solved the illegal invasion problem of illegal transducer further, avoided the obstruction of system data flow, guaranteed the stability of system.
One of ordinary skill in the art will appreciate that: all or part of step that realizes said method embodiment can be accomplished through the relevant hardware of program command; Aforesaid program can be stored in the computer read/write memory medium; This program the step that comprises said method embodiment when carrying out; And aforesaid storage medium comprises: various media that can be program code stored such as ROM, RAM, magnetic disc or CD.
Fig. 3 is the structural representation of an embodiment of transducer Verification System of the present invention; As shown in Figure 3; This system comprises: terminal installation 1 and application platform 2, wherein, after terminal installation 1 is used to obtain the characteristic information of transducer; Obtain authorization information according to characteristic information and preset encryption algorithm, and send the checking request that comprises authorization information to application platform 2; It is legal that application platform 2 is used for determining whether according to authorization information and the legal information that prestores, and send feedback information according to judged result to terminal installation 1, determines whether to handle the Information Monitoring that said transducer sends for terminal installation 1 according to feedback information.
The function and the handling process of each module in the transducer Verification System that present embodiment provides can be referring to above-mentioned method embodiment shown in Figure 1, and its realization principle and technique effect are similar, repeat no more here.
Fig. 4 is the structural representation of another embodiment of transducer Verification System of the present invention; As shown in Figure 4; Based on embodiment illustrated in fig. 3, this system also comprises: identification module 3 is used for the characteristic information that receiver terminal device 1 sends; And obtain authorization information according to preset encryption algorithm and characteristic information, and return authorization information to terminal installation 1.
In the present embodiment, terminal installation 1 specifically is used for: send characteristic information to transducer and obtain request, and the mark sheet that returns of receiving sensor, and obtain characteristic information according to mark sheet and preset information extraction rule.
Further, terminal installation 1 also is used for then transducer being carried out power down process if feedback information representes that transducer is illegal.
The function and the handling process of each module in the transducer Verification System that present embodiment provides can be referring to above-mentioned method embodiment shown in Figure 2, and its realization principle and technique effect are similar, repeat no more here.
What should explain at last is: above embodiment is only in order to explaining technical scheme of the present invention, but not to its restriction; Although with reference to previous embodiment the present invention has been carried out detailed explanation, those of ordinary skill in the art is to be understood that: it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement; And these are revised or replacement, do not make the spirit and the scope of the essence disengaging various embodiments of the present invention technical scheme of relevant art scheme.

Claims (9)

1. a transducer authentication method is characterized in that, comprising:
After terminal installation obtains the characteristic information of transducer, obtain authorization information, and send the checking request that comprises said authorization information to application platform according to said characteristic information and preset encryption algorithm;
It is legal that said application platform determines whether according to said authorization information and the legal information that prestores, and send feedback information according to judged result to said terminal installation;
Said terminal installation determines whether to handle the Information Monitoring that said transducer sends according to said feedback information.
2. transducer authentication method according to claim 1 is characterized in that, said terminal installation obtains authorization information according to the characteristic information and the preset encryption algorithm of transducer, comprising:
Said terminal installation sends to identification module with said characteristic information;
Said identification module obtains said authorization information according to preset encryption algorithm and said characteristic information, and sends said authorization information to said terminal installation.
3. transducer authentication method according to claim 1 and 2 is characterized in that, if said feedback information representes that said transducer is illegal, then said method also comprises:
Said terminal installation carries out power down process to said transducer.
4. transducer authentication method according to claim 1 and 2 is characterized in that, the characteristic information that said terminal installation obtains transducer comprises:
Said terminal installation sends characteristic information to said transducer and obtains request;
Said transducer is to said terminal installation backout feature table;
Said terminal installation obtains said characteristic information according to said mark sheet and preset information extraction rule.
5. transducer authentication method according to claim 4 is characterized in that,
Carry out data interaction through wired or wireless transmission between said terminal installation and the said transducer.
6. a transducer Verification System is characterized in that, comprising:
Terminal installation after being used to obtain the characteristic information of transducer, obtains authorization information according to said characteristic information and preset encryption algorithm, and sends the checking request that comprises said authorization information to application platform;
Said application platform; It is legal to be used for determining whether according to said authorization information and the legal information that prestores; And send feedback information to said terminal installation according to judged result, determine whether to handle the Information Monitoring that said transducer sends for said terminal installation according to said feedback information.
7. transducer Verification System according to claim 6 is characterized in that, said system also comprises:
Identification module is used to receive the said characteristic information that said terminal installation sends, and obtains said authorization information according to preset encryption algorithm and said characteristic information, and returns said authorization information to said terminal installation.
8. according to claim 6 or 7 described transducer Verification Systems, it is characterized in that said terminal installation also is used for:
If said feedback information representes that said transducer is illegal, then said transducer is carried out power down process.
9. according to claim 6 or 7 described transducer Verification Systems, it is characterized in that said terminal installation specifically is used for:
Send characteristic information to said transducer and obtain request, and receive the mark sheet that said transducer returns, and obtain said characteristic information according to said mark sheet and preset information extraction rule.
CN201110390883.8A 2011-11-30 2011-11-30 Sensor authentication method and system Active CN102497398B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110390883.8A CN102497398B (en) 2011-11-30 2011-11-30 Sensor authentication method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110390883.8A CN102497398B (en) 2011-11-30 2011-11-30 Sensor authentication method and system

Publications (2)

Publication Number Publication Date
CN102497398A true CN102497398A (en) 2012-06-13
CN102497398B CN102497398B (en) 2014-09-17

Family

ID=46189183

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110390883.8A Active CN102497398B (en) 2011-11-30 2011-11-30 Sensor authentication method and system

Country Status (1)

Country Link
CN (1) CN102497398B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801723A (en) * 2012-08-09 2012-11-28 福建物联天下信息科技有限公司 Access device and method for Internet of things
CN103841119A (en) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 Method and system for achieving equipment access authentication based on Home-IOT cloud gateway
CN104270342A (en) * 2014-09-11 2015-01-07 深圳市深信服电子科技有限公司 Access method and system for virtual desktop
CN106128061A (en) * 2016-08-29 2016-11-16 苏州盖恩茨电子科技有限公司 A kind of terminal matched motor drive signal harvester
CN106227101A (en) * 2016-08-29 2016-12-14 苏州盖恩茨电子科技有限公司 A kind of intelligent terminal's matched safety signal harvester
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060036442A1 (en) * 2004-07-30 2006-02-16 Sbc Knowledge Ventures, L.P. Centralized biometric authentication
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN102026188A (en) * 2010-12-09 2011-04-20 中国联合网络通信集团有限公司 Authentication method, equipment and system
CN102065423A (en) * 2010-12-13 2011-05-18 中国联合网络通信集团有限公司 Node access authentication method, access authenticated node, access node and communication system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060036442A1 (en) * 2004-07-30 2006-02-16 Sbc Knowledge Ventures, L.P. Centralized biometric authentication
CN1951326A (en) * 2006-11-03 2007-04-25 北京飞天诚信科技有限公司 Identity recognition system and method based on intelligent physical characteristics collecting and processing terminal
CN102026188A (en) * 2010-12-09 2011-04-20 中国联合网络通信集团有限公司 Authentication method, equipment and system
CN102065423A (en) * 2010-12-13 2011-05-18 中国联合网络通信集团有限公司 Node access authentication method, access authenticated node, access node and communication system

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102801723A (en) * 2012-08-09 2012-11-28 福建物联天下信息科技有限公司 Access device and method for Internet of things
CN102801723B (en) * 2012-08-09 2016-08-03 福建物联天下信息科技股份有限公司 Internet of things access equipment and method
CN103841119A (en) * 2014-03-25 2014-06-04 广州物联家信息科技股份有限公司 Method and system for achieving equipment access authentication based on Home-IOT cloud gateway
CN103841119B (en) * 2014-03-25 2017-12-01 广州物联家信息科技股份有限公司 The method and system for realizing equipment access authentication are closed based on Home IOT clouds
CN104270342A (en) * 2014-09-11 2015-01-07 深圳市深信服电子科技有限公司 Access method and system for virtual desktop
CN104270342B (en) * 2014-09-11 2017-10-20 深信服科技股份有限公司 The access method and system of virtual desktop
CN106128061A (en) * 2016-08-29 2016-11-16 苏州盖恩茨电子科技有限公司 A kind of terminal matched motor drive signal harvester
CN106227101A (en) * 2016-08-29 2016-12-14 苏州盖恩茨电子科技有限公司 A kind of intelligent terminal's matched safety signal harvester
CN112243008A (en) * 2020-10-16 2021-01-19 中国联合网络通信集团有限公司 Data management method and device

Also Published As

Publication number Publication date
CN102497398B (en) 2014-09-17

Similar Documents

Publication Publication Date Title
CN102497398B (en) Sensor authentication method and system
CN102571950B (en) Media content providing and acquiring methods, server and user terminal
US10341367B1 (en) System and method for inquiring IOC information by P2P protocol
US9614723B2 (en) Device commissioning
CN102104883B (en) Method and system for defining information in machine-to-machine (M2M) platform and M2M platform
CN109870968B (en) Intelligent security system
CN104703182A (en) Zigbee-based networking method and network system
CN108282453B (en) Internet of things reading device, safe access method and control center equipment
CN109309650B (en) Data processing method, terminal equipment and network equipment
CN105246096A (en) Quick access method for low-power consumption Internet of things equipment
KR102148757B1 (en) Method and apparatus for transmitting/receiving data in a communication system
CN104320250A (en) Anti-counterfeiting authentication method based on NFC chip
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN110535877A (en) Internet-of-things terminal identity identifying method and Verification System based on double authentication
CN102801713A (en) Website logging-in method and system as well as accessing management platform
CN105262752A (en) Data processing method and device of virtual key, mobile terminal and server
KR101775823B1 (en) Method and system for controlling device based internet of things
CN110198533B (en) Method for remotely controlling BLE Bluetooth device and BLE Bluetooth device
CN107404722B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN102523580A (en) M2M (Machine-to-Machine/Man) service terminal data processing method and M2M service card as well as M2M terminal data processing card
CN114666074B (en) Product identification authentication method and device
CN104754041A (en) Internet of things communication method and related devices
EP3562194B1 (en) Method for identifying at least one network slice configuration of a mobile network, communication system, and automation system
CN111127706B (en) Intelligent lock control method, intelligent lock, cloud server and computing equipment
US11140001B2 (en) Method for providing data packets from a CAN bus, control device and system having a CAN bus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant